option
Cuestiones
ayuda
daypo
buscar.php

Test_Iluminacion_

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
Test_Iluminacion_

Descripción:
Preguntas Iluminación

Fecha de Creación: 2025/10/12

Categoría: Ocio

Número Preguntas: 33

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

When Fortinac passes a firewall tag to FortiGate, what determines the value that is passed?. Security rule. Device profiling rule. Logical Network. RADIUS group attribute.

Which two device classification options can register a device automatically and transparently to the end user?(Choose two). MDM integration. Captive Portal. Dissolvable agent. Dot1x Auto Registration. Device Importing.

Which group type can have members added directly from the FortiNAC Control Manager?. Port. Host. Device. Administrator.

An administrator is configuring FortiNAC to manage Fortigate Vpn users. As part of the configuration, the adminsitrator must configure a fewFortigate firewall policies. What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?. To allow access to only the FortiNAC VPN Interface. To deny access to only the FortiNAC VPN interface. To allow access to only the productions DNS server. To deny access to only the production DNS server.

Which two things must be done to allow FortiNAC to process incoming syslog messeges from an unknown vendor ?(Choose Two). The device must be added as a log receiver. The device must be added as a patch management server. The device sending the messages must be modeled in the Network Inventory view. A security event parser must be created for the device.

What is the state of database replication?. Secondary to primary synchronization failed. Secondary to primary synchronization was successful. Primary to secondary synchronization failed. Primary to secondary database synchronization was successful.

Refer to the exhibit If a host is connected to a port in the Building 1 FirsFloor Ports group, what must also be true to matchthis user/host profile?. The host must have a role value of contractor or an installed persistent agent and a securityaccess value of contractor, and be connected between 6 AM and 5 PM. The host must have a role value of contractor , an installed persistent agent or a securityaccess value of contractor, and be conneted between 6 AM and 5PM. The host must have a role value of contractor or an installed persistent agent , a securityaccess value of contractor, and be connected between 9AM and 5PM. The host must have a role value of contractor or an installed persistent agent , a securityaccess value of contractor, and be connected between 6AM and 5PM.

View the command and output shown in the exhibit. What is the current state of this host?. Rogue. Not Authenticated. At-Risk. Registered.

An administrator wants the Host AT Risk event to generate an alarm. What is used to achieve this result?. A security filter. An event to action mapping. An event to alarm mapping. A security trigger activity.

What Causes a hosts state to change to "at risk ". The host has failed an endpoint complaince policy or admin scan. The logged on user is not found in the Active Directory. The host has been administratively disabled. The host is not in the Registered Hosts group.

Where do you look to determine what network access policy, if any, is being applied to aparticular host?. The Policy Details view for the host. The policy Logs view. The network access policy configuration. The Port Properties view of the hosts port.

Where are logical network values defined?. In the model configuration view of each infrastructure device. In the port properties view of each port. On the profield devices view. In the security and access fiels of each host record.

Which agent can receive and display messages from FortiNAC to then end user?. Persistent. MDM. Passive. Dissolvable.

Which two agents can validate endpoint compliance transparently to the end user?(Choose two). Passive. Dissolvable. Mobile. Persistent.

When you create a user or host profile, which three crtiteria can you use? (Choose Three). An applied access policy. Host or user attributes. Administrative group memebership. Location. Host or user group memebership.

Which three of the following are components of a security rule? (Choose three). Security String. Methods. Action. User or host profile. Trigger.

Which system group will force at-risk hosts into the quarantine network, based on point of connection?. Forced Isolation. Physcal Address Filtering. Forced Quarantine. Forced Remediation.

Which enforcement for network access policies and at-risk hosts enable, what wil happen if host matches a network access policy and has a state of "a risk"?. The host is provisioned based on the deafult access defined by the point of connection. The host is provisioned based on the network access policiy?. The host is isolated. The host is administratively disabled.

Which connecting endpoints are evaluated agains all enabled device profiling rules?. All host, each time they connect. Rogues devices , only when they connect for the first time. Know trusted devices each time they change location. Rogues devices , each time they connect?.

In an isolation VLAN which three services does FortiNAC supply ? (Choose three). NTP. SMTP. DHCP. DDNS. WEB.

What would occur if both an unknow (rogue) device and know (trusted) device simultaneously appearedon a port that is a memeber of the Forced Registration port group?. The port would be provisioned fort the normal state host,and both hosts would have access to that VLAN. The port would not be managed, and an event would be generated. The port would be provisioned to the registration network, and both hosts would besiolated. The port would be administratively shutdown.

If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) hostconnects to a port on the switch, what will occur?. no VLAN change is performanced. The host is moved a default isolation VLAN. The Host is disabled. The host is moved to VLAN 111.

How are logical networks assigned to endpoints?. Through device profiling rules. Throught network access policies. Throught Layer 3 polling configurations. Throught Fortigate IPV4 policies.

Which host is rogue?. 1. 3. 2. 4.

In a wireless integration, how does FortiNAC obtain connecting MAC address information?. MAC notification Traps. Link Traps. End station traffic monitoring. RADIUS.

Which three communication methods are used by the FortiNAC to gather information from, and control , infraestructure devices ? (Choose Three). RADIUS. FTP. SNMP. CLI. SMTP.

What agent is required in order to detect an added USB drive?. Persistent. Dissolvable. Mobile. Passive.

How Should you configured MAC notification traps on a supported switch?. Configure Them only after you configure linkup and linkdown traps. Configurre them only on ports set as 802.1 trunks. Configure them on all ports except uplink ports. Configure Them on all ports on the switch.

During the on-boarding process through the captive portal, why would a host that successfully registered remain stuck in the Registration VLAN? ( Choose two). Bridging is enabled on the host. There is another unregistered host on the same port. The ports default VLAN is the same as the Registration VLAN. The wrong agent is installed.

In which view would you find who made modifications to a Group?. The Event Management view. The Security Events view. The Alarms view. The Admin Auditing view.

Which two of the following are required for endpoint compliance monitors?(Choose two). Persistent agent. Logged on user. Security rule. Custom scan.

Which agent is used only as part of a login script?. Mobile. Passive. Persistent. Dissolvable.

By deafult, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?. The port is switched into the Dead-End VLAN. The port becomes a threshold uplink. The port is disabled. The port is added to the Forced Registration group.

Denunciar Test