New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Fortinet Network Security Expert NSE5_FNC_AD_7.6 Questions and answers with Dumpstech

Exam NSE5_FNC_AD_7.6 Premium Access

View all detail and faqs for the NSE5_FNC_AD_7.6 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit.

Question # 1

What will happen to the host of a guest user created from this template if the time of connection is 8:00 PM?

Options:

A.

The host will be marked as non-authenticated.

B.

The host will be marked as a rogue device.

C.

The host will be marked as at-risk.

D.

The host will be administratively disabled.

Questions # 2:

A healthcare organization is integrating FortiNAC-F with its existing MDM. Communication is failing between the systems.

What could be a probable cause?

Options:

A.

Security Fabric traffic is failing

B.

SSH communication is failing

C.

REST API communication is failing

D.

SOAP API communication is failing

Questions # 3:

An administrator manages a corporate environment where all users log into the corporate domain each time they connect to the network. The administrator wants to leverage login scripts to use a FortiNAC-F agent to enhance endpoint visibility

Which agent can be deployed as part of a login script?

Options:

A.

Persistent

B.

Dissolvable

C.

Mobile

D.

Passive

Questions # 4:

How can an administrator configure FortiNAC-F to normalize incoming syslog event levels across vendors?

Options:

A.

Configure severity mappings.

B.

Configure the vendor OUI settings.

C.

Configure the security rule settings.

D.

Configure event to alarm mappings.

Questions # 5:

During an evaluation of state-based enforcement, an administrator discovers that ports that should not be under enforcement have been added to enforcement groups.

In which view would the administrator be able to identify who added the ports to the groups?

(Selected)

Options:

A.

The Admin Auditing view

B.

The Event Management view

C.

The Port Changes view

D.

The Security Events view

Questions # 6:

Where should you configure MAC notification traps on a supported switch?

Options:

A.

Only on ports that generate linkup and linkdown traps

B.

Only on ports defined as learned uplinks

C.

On all ports on the switch

D.

On all ports except uplink ports

Questions # 7:

Refer to the exhibit.

Question # 7

If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?

Options:

A.

The host must have a role value of contractor, an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

B.

The host must have a role value of contractor or an installed persistent agent, a security access value of contractor, and be connected between 9 AM and 5 PM.

C.

The host must have a role value of contractor or an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 PM.

D.

The host must have a role value of contractor or an installed persistent agent and a security access value of contractor, and be connected between 6 AM and 5 PM.

Questions # 8:

Which two requirements must be met to set up an N+1 HA cluster? (Choose two.)

Options:

A.

A FortiNAC-F manager

B.

A FortiNAC-F device designated as a secondary

C.

A dedicated VLAN for primary and secondary synchronization

D.

At least two FortiNAC-F devices designated as primary

Questions # 9:

When creating a user or host profile, which three criteria can you apply? (Choose three.)

Options:

A.

Host or user group memberships

B.

Host or user attributes

C.

Adapter current VLAN

D.

An applied access policy

E.

Location

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions