
TEST

Quiz
•
English
•
1st - 5th Grade
•
Easy

Sebastian Zapata
Used 1+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which one of the supported communication methods does FortiNAC usefor initial device identification during discovery?
A. LLDP
B. SNMP
C. API
D. SSH
Answer explanation
FortiNAC uses a variety of methods to identify devices on the network, such as Vendor OUI, DHCP fingerprinting, and device profiling12. One of the supported communication methods that FortiNAC uses for initial device identification during discovery is SNMP (Simple Network Management Protocol)3. SNMP is a protocol that allows network devices to exchange information and monitor their status4. FortiNAC can use SNMP to read information from switches and routers, such as MAC addresses, IP addresses, VLANs, and port status3. SNMP can also be used to configure network devices and enforce policies4. References: 1: Identification | FortiNAC 9.4.0 - Fortinet Documentation 2: Device profiling process | FortiNAC8.3.0 | Fortinet Document Library 3: Using FortiNAC to identify medical devices - James Pratt 4: How does FortiNAC identify a new device on the network?
2.
MULTIPLE SELECT QUESTION
5 mins • 1 pt
Which three methods can you use to trigger layer 2 polling on FortiNAC? (Choose three)
A. Polling scripts
B. Link traps
C. Manual polling
D. Scheduled tasks
E. Polling using API
Answer explanation
To trigger layer 2 polling on FortiNAC, the three methods are:
A. Polling scripts: These are scripts configured within FortiNAC to actively poll the network at layer 2 to gather information about connected devices.
C. Manual polling: This involves manually initiating a polling process from the FortiNAC interface to gather current network information.
D. Scheduled tasks: Polling can be scheduled as regular tasks within FortiNAC, allowing for automated, periodic collection of network data.
The other options are not standard methods for layer 2 polling in FortiNAC:
B. Link traps: These are more related to SNMP trap messages rather than layer 2 polling.
E. Polling using API: While APIs are used for various integrations, they are not typically used for initiating layer 2 polling in FortiNAC.
References:
FortiNAC Layer 2 Polling Documentation. ConfiguringPollingMethodsinFortiNAC
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
An administrator is trying to create a separate web tittering profile for off-fabric and on-fabric clients and push it to managed FortiClient devices
A. Endpoint policy
B. ZTNA connection rules
C. System settings
D. On-fabric rule sets
Answer explanation
Explanation
To create a separate web filtering profile for off-fabric and on-fabric clients and push it to managed FortiClient devices in FortiClient EMS, the feature can be enabled in:
A. Endpoint Policy: This is where administrators can define and manage different policies for FortiClient endpoints. These policies can include settings for web filtering, which can be customized for on-fabric and off-fabric scenarios.
The other options do not directly relate to the creation and management of web filtering profiles:
B. ZTNA Connection Rules: These rules are more focused on access control and do not deal directly with web filtering profiles.
C. System Settings: This section typically includes overall system configurations rather than specific policy definitions.
D. On-fabric Rule Sets: While important for on-fabric configurations, they don't directly deal with web filtering profiles.
References:
FortiClient EMS Administration Guide.
Managing Endpoint Policies in FortiClient EMS.
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
FortiNAC has alarm mappings configured for MDM compliance failure, and FortiClient EMS is added as a MDM connector When an endpoint is quarantined by FortiClient EMS, what action does FortiNAC perform?
A. The host is isolated in the registration VLAN
B. The host is marked at risk
C. The host is forced to authenticate again
D. The host is disabled
Answer explanation
Explanation
In the scenario where FortiNAC has alarm mappings configured for MDM (Mobile Device Management) compliance failure and FortiClient EMS (Endpoint Management System) is integrated as an MDM connector, the typical response when an endpoint is quarantined by FortiClient EMS is to isolate the host in the registration VLAN. This action is consistent with FortiNAC's approach to network access control, focusing on ensuring network security and compliance. By moving the non-compliant or quarantined host to a registration VLAN, FortiNAC effectively segregates it from the rest of the network, mitigating potential risks while allowing for further investigation or remediation steps.References:FortiNAC documentation, MDM Compliance and Response Actions.
5.
MULTIPLE SELECT QUESTION
5 mins • 1 pt
Which two statements are true regarding certificate-based authentication for ZTNA deployment? (Choose two.)
A. FortiGate signs the client certificate submitted by FortiClient.
B. The default action for empty certificates is block
C. Certificate actions can be configured only on the FortiGate CLI
D. Client certificate configuration is a mandatory component for ZTNA
Answer explanation
Explanation
Certificate-based authentication is a method of verifying the identity of a device or user by using a digital certificate issued by a trusted authority. For ZTNA deployment, certificate-based authentication is used to ensure that only authorized devices and users can access the protected applications or resources.
B. The default action for empty certificates is block. This is true because ZTNA requires both device and user verification before granting access. If a device does not have a valid certificate issued by the ZTNA CA, it will be blocked by the ZTNA gateway. This prevents unauthorized or compromised devices from accessing the network.
D. Client certificate configuration is a mandatory component for ZTNA. This is true because ZTNA relies on client certificates to identify and authenticate devices. Client certificates are generated by the ZTNA CA and contain the device ID, ZTNA tags, and other information. Client certificates are distributed to devices by the ZTNA management server (such as EMS) and are used to establish a secure connection with the ZTNA gateway.
A. FortiGate signs the client certificate submitted by FortiClient. This is false because FortiGate does not sign the client certificates. The client certificates are signed by the ZTNA CA, which is a separate entity from FortiGate. FortiGate only verifies the client certificates and performs certificate actions based on the ZTNA tags.
C. Certificate actions can be configured only on the FortiGate CLI. This is false because certificate actions can be configured on both the FortiGate GUI and CLI. Certificate actions are the actions that FortiGate takes based on the ZTNA tags in the client certificates. For example, FortiGate can allow, block, or redirect traffic based on the ZTNA tags.
References :=
1: Technical Tip: ZTNA for Corporate hosts with SAML authentication and FortiAuthenticator as IDP 2: Zero Trust Network Access - Fortinet
6.
MULTIPLE SELECT QUESTION
5 mins • 1 pt
An administrator wants to prevent direct host-to-host communication at layer 2 and use only FortiGate to inspect all the VLAN traffic What three things must the administrator configure on FortiGate to allow traffic between the hosts? (Choose three.)
A. Configure proxy ARP to allow traffic
B. Block intra-VLAN traffic in the VLAN interface settings
C. Add the VLAN interface to a software switch
D. Configure static routes to allow subnets
E. Configure a firewall policy to allow the desired traffic between hosts
Answer explanation
Explanation
To prevent direct host-to-host communication at layer 2 and use only FortiGate to inspect all the VLAN traffic, an administrator must configure:
B. Block intra-VLAN traffic in the VLAN interface settings: This setting prevents direct communication between hosts within the same VLAN, forcing traffic to be routed through FortiGate for inspection.
D. Configure static routes to allow subnets: By setting up static routes, the administrator ensures that traffic between different subnets is correctly routed through the FortiGate for inspection and policy enforcement.
E. Configure a firewall policy to allow the desired traffic between hosts: Firewall policies on the FortiGate will dictate what traffic is permitted between hosts, ensuring that only authorized traffic is allowed.
The other options are not typically required for this setup:
A. Configure proxy ARP to allow traffic: Proxy ARP is not necessary for this scenario as it involves answering ARP requests on behalf of another host, which is not relevant to blocking intra-VLAN traffic.
C. Add the VLAN interface to a software switch: This would create a switch-like environment on the FortiGate, which is counterproductive to the goal of preventing direct host-to-host communication at layer 2.
References:
FortiGate VLAN Configuration Guide.
Blocking Intra-VLAN Communication in FortiGate.
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
In which FortiNAC configuration stage do you define endpoint compliance?
A. Device onboarding
B. Management configuration
C. Policy configuration
D. Network modeling
Answer explanation
Endpoint compliance is defined in the policy configuration stage of FortiNAC. Endpoint compliance policies specify which endpoint compliance configuration and user/host profile are applied to a host based on its location, user, and device type. Endpoint compliance configurations define whether a host is required to download an agent and undergo a scan, permitted access with no scan, or denied access. The scan parameters and security actions are also configured in the endpoint compliance configurations. Therefore, to define endpoint compliance, you need to create and assign endpoint compliance policies and configurations in the policy configuration stage of
FortiNAC. References := https://docs.fortinet.com/document/fortinac/9.4.0/administration-guide/985922/endpoi https://docs.fortinet.com/document/fortinac/9.4.0/fortinac-manager/161887/endpoint-compliance-configurations
Create a free account and access millions of resources
Similar Resources on Wayground
27 questions
Day 3 - Toeic - Part 1

Quiz
•
1st - 5th Grade
35 questions
english basic test review

Quiz
•
4th Grade
25 questions
High-level Programming languages

Quiz
•
KG - 3rd Grade
25 questions
Chương 8

Quiz
•
1st - 5th Grade
30 questions
Jobs

Quiz
•
5th Grade
25 questions
Liar Liar

Quiz
•
5th Grade - University
25 questions
The Candymakers Test

Quiz
•
5th Grade
30 questions
Tiếng anh lớp 5: Quá khứ đơn

Quiz
•
5th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade