Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEEMEESE

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
EMEESE

Descripción:
EMEESEEMEESEEMEESE EMEESEEMEESE

Autor:
AVATAR

Fecha de Creación:
18/09/2023

Categoría:
Ocio

Número preguntas: 45
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
Which component or device shares device status information through ZTNA telemetry? FortiClient FortiGate FortiGate Access Proxy FortiClient EMS.
Which statement about FortiClient comprehensive endpoint protection is true? It helps to safeguard systems from email spam. It helps to safeguard systems from advanced security threats, such as malware It helps to safeguard systems from data loss. It helps to safeguard systems from DDoS.
Which two third-party tools can an administrator use to deploy FortiClient? (Choose two.) Microsoft Active Directory GPO Microsoft SCCM QR code generator Microsoft Windows Installer.
In a FortiSandbox integration, what does the remediation option do? Deny access to a file when it sees no results Wait for FortiSandbox results before allowing files Alert and notify only Exclude specified files.
An administrator is required to maintain a software vulnerability on the endpoints, without showing the feature on the FortiClient dashboard. What must the administrator do to achieve this requirement? Click the hide icon on the vulnerability scan tab Most Voted Use the default endpoint profile Disable select the vulnerability scan feature in the deployment package Select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile.
An administrator deploys a FortiClient installation through the Microsoft AD group policy. After the installation is complete, all the custom configuration is missing. What could have caused this problem? The FortiClient MST file is missing from the distribution package. The FortiClient package is not assigned to the group. The FortiClient .exe file is included in the distribution package. FortiClient does not have permission to access the distribution package.
An administrator installs FortiClient on Windows Server. What is the default behavior of real-time protection control? Real-time protection must update AV signature database Real-time protection is disabled. Real-time protection sends malicious files to FortiSandbox when the file is not detected locally. Real-time protection must update the signature database from FortiSandbox.
Refer to the exhibit, which shows the output of the ZTNA traffic log on FortiGate. The remote user connection does not match the explicit proxy policy. The remote user connection does not match the ZTNA server configuration. The remote user connection does not match the ZTNA firewall policy. The remote user connection does not match the ZTNA rule configuration.
What action does FortiClient anti-exploit detection take when it detects exploits? Deletes the compromised application process Blocks memory allocation to the compromised application process Terminates the compromised application process Patches the compromised application process.
Based on the settings shown in the exhibit, which action will FortiClient take when users try to access www facebook.com? FortiClient will prompt a warning message to warn the user before they can access the Facebook website. FortiClient will block access to Facebook and its subdomains. FortiClient will monitor only the user’s web access to the Facebook website. FortiClient will allow access to Facebook.
Which component or device shares ZTNA tag information through Security Fabric integration? FortiClient FortiClient EMS FortiGate FortiGate Access Proxy.
Which two VPN types can a FortiClient endpoint user initiate from the Windows command prompt? (Choose two.) PPTP L2TP SSL VPN IPSec.
An administrator has restored the modified XML configuration file to FortiClient and sees the error shown in the exhibit. Based on the XML settings, what must the administrator do to resolve the issue with the XML configuration file? The administrator must use a password to decrypt the file. The administrator must resolve the XML syntax error. The administrator must save the file as FortiClient-config.conf. The administrator must change the file format.
Based on the settings shown in the exhibit, which statement about FortiClient behaviour is true? FortiClient blocks and deletes infected files after scanning them. FortiClient copies infected files to the Resources folder without scanning them. FortiClient quarantines infected files and reviews later, after scanning them. FortiClient scans infected files when the user copies files to the Resources folder.
Based on the logs shown in the exhibit, why did FortiClient EMS fail to install FortiClient on the endpoint? The FortiClient antivirus service is not running. The Windows installer service is not running. The task scheduler service is not running. The remote registry service is not running.
Based on the FortiClient logs shown in the exhibit, which software application is blocked by the application firewall? Twitter Facebook Firefox Internet Explorer.
When site categories are disabled in FortiClient webfilter and antivirus (malicious websites), which feature can be used to protect the endpoint from malicious web access? Web exclusion list FortiSandbox URL list Real-time protection list Block malicious websites on antivirus.
Refer to the exhibits, which show a network topology diagram of ZTNA proxy access and the ZTNA rule configuration. An administrator runs the diagnose endpoint record list CLI command on FortiGate to check Remote-Client endpoint information, however Remote-Client is not showing up in the endpoint record list. What is the cause of this issue? Remote-Client failed the client certificate authentication. Remote-Client provided an empty client certificate to connect to the ZTNA access proxy. Remote-Client has not initiated a connection to the ZTNA access proxy. Remote-Client provided an invalid certificate to connect to the ZTNA access proxy.
What two conclusions can you make based on the Remote-Client status shown above? (Choose two.) The endpoint is classified as at risk. The endpoint has been assigned the Default endpoint policy. The endpoint is configured to support FortiSandbox. The endpoint is currently off-net.
Which two statements about the rule set are true? (Choose two.) The endpoint must satisfy that only Windows 10 is running. The endpoint must satisfy that only AV software is installed and running. The endpoint must satisfy that antivirus is installed and running and Windows 10 is running. The endpoint must satisfy that only Windows Server 2012 R2 is running.
An administrator wants to simplify remote access without asking users to provide user credentials. Which access control method provides this solution? ZTNA full mode SSL VPN L2TP ZTNA IP/MAC filtering mode.
Which two statements are true about the ZTNA rule? (Choose two.) It enforces access control. It redirects the client request to the access proxy. It applies security profiles to protect traffic. It defines the access proxy.
What is the function of the quick scan option on FortiClient? It scans programs and drivers that are currently running, for threats. It performs a full system scan including all files, executable files, DLLs, and drivers for threats. It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats. It scans executable files, DLLs, and drivers that are currently running, for threats.
Which two benefits are benefits of using multi-tenancy mode on FortiClient EMS? (Choose two.) It provides granular access and segmentation. The fabric connector must use an IP address to connect to FortiClient EMS. Licenses are shared among sites. Separate host servers manage each site.
Based on the settings shown in the exhibit, what action will FortiClient take when it detects that a user is trying to download an infected file? Blocks the infected files as it is downloading Sends the infected file to FortiGuard for analysis Quarantines the infected files and logs all access attempts Allows the infected file to download without scan.
Based on the Security Fabric automation settings, what action will be taken on compromised endpoints? Endpoints will be banned on FortiGate. Endpoints will be quarantined through a network device. An email notification will be sent for compromised endpoints. Endpoints will be quarantined through EMS.
Remote-Client is tagged as Remote-Users on the FortiClient EMS Zero Trust Tag Monitor. What must an administrator do to show the tag on the FortiClient GUI? Change the FortiClient system settings to enable tag visibility. Update tagging rule logic to enable tag visibility. Change the user identity settings to enable tag visibility. Change the endpoint control setting to enable tag visibility.
An administrator configures ZTNA configuration on the FortiGate for remote users. Which statement is true about the firewall policy? It defines the access proxy. It redirects the client request to the access proxy. It applies security profiles to protect traffic. It enforces access control.
Why does FortiGate need the root CA certificate of FortiClient EMS? To update FortiClient client certificates To trust certificates issued by FortiClient EMS To revoke FortiClient client certificates To sign FortiClient CSR requests.
Which statement about the FortiClient enterprise management server is true? It receives the configuration information of endpoints from FortiGate. It provides centralized management of multiple endpoints running FortiClient software. It receives the CA certificate from FortiGate to validate client certificates. It enforces compliance on the endpoints using tags.
Refer to the exhibit, which shows the output of the ZTNA traffic log on FortiGate. The remote user connection does not match the explicit proxy policy. The remote user connection does not match the ZTNA server configuration The remote user connection does not match the ZTNA firewall policy. The remote user connection does not match the ZTNA rule configuration.
A FortiClient EMS administrator has enabled the compliance rule for the sales department. Which Fortinet device will enforce compliance with dynamic access control? FortiAnalyzer FortiClient EMS FortiGate FortiClient.
Which three features does FortiClient endpoint security include? (Choose three.) Real-time protection IPsec Vulnerability management DLP L2TP.
Based on the settings shown in the exhibit, which two actions must the administrator take to make the endpoint compliant? (Choose two.) Enable the webfilter profile. Integrate FortiSandbox for infected file analysis. Patch applications that have vulnerability rated as high or above. Run Calculator application on the endpoint.
Which security fabric component sends a notification to quarantine an endpoint after IOC detection in the automation process? FortiClient EMS FortiAnalyzer FortiClient FortiGate.
When an administrator creates a deployment profile on FortiClient EMS, which statement about the deployment profile is true? Deployment-2 will install FortiClient on both the AD group and workgroup. Deployment-2 will upgrade FortiClient on both the AD group and workgroup. Deployment-1 will install FortiClient on new AD group endpoints. Deployment-1 will upgrade FortiClient only on the workgroup.
Based on the FortiClient log details shown in the exhibit, which two statements are true? (Choose two.) The filename is sent to FortiSandbox for further inspection. The file status is Quarantined. The file location is \??\D:\Users\. The filename is Unconfirmed 899290.crdownload.
Which policy is applied to the endpoint in the AD group trainingAD? Both the Sales and Training policies because their priority is higher than the Default policy The Training policy The Default policy because it has the highest priority The Sales policy.
An administrator has a requirement to add user authentication to the ZTNA access for remote or off-fabric users. Which FortiGate feature is required in addition to ZTNA? FortiGate endpoint control FortiGate certificates FortiGate FSSO FortiGate explicit proxy.
What does FortiClient do as a fabric agent? (Choose two.) Provides application inventory Provides IOC verdicts Automates Responses Creates dynamic policies.
An administrator installs FortiClient EMS in the enterprise. Which component is responsible for enforcing protection and checking security posture? FortiClient vulnerability scan FortiClient EMS tags FortiClient FortiClient EMS.
An administrator needs to connect FortiClient EMS as a fabric connector to FortiGate. What is the prerequisite to get FortiClient EMS to connect to FortiGate successfully? Import and verify the FortiClient EMS root CA certificate on FortiGate. Revoke and update the FortiClient client certificate on EMS. Revoke and update the FortiClient EMS root CA. Import and verify the FortiClient client certificate on FortiGate.
Based on the FortiClient logs shown in the exhibit, which endpoint profile policy is currently applied to the FortiClient endpoint from the EMS server? Compliance rules default Default Default configuration policy Fortinet-Training.
A new chrome book is connected in a school's network. Which component can the EMS administrator use to manage the FortiClient web filter extension installed on the Google Chromebook endpoint? FortiClient web filter extension FortiClient site categories FortiClient customer URL list FortiClient EMS.
Which two statements are true about ZTNA? (Choose two.) ZTNA provides role-based access. ZTNA manages access for remote users only. ZTNA manages access through the client only ZTNA provides a security posture check.
Denunciar test Consentimiento Condiciones de uso