3 Months Free Update
3 Months Free Update
3 Months Free Update
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?
Which connecting endpoints are evaluated against all enabled device profiling rules?
Refer to the exhibit.
If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?
With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
Which system group will force at-risk hosts into the quarantine network, based on point of connection?
During the on-boarding process through the captive portal, what are two reasons why a host that successfully registered would remain stuck in the Registration VLAN? (Choose two.)
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?
By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single switch port simultaneously, what happens to the port?