Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)
A. SNMP
B. RADIUS
C. FTP
D. CLI
E. SMTP
How should you configure MAC notification traps on a supported switch?
A. Configure them only on ports set as 802.1q trunks
B. Configure them on all ports except uplink ports
C. Configure them on all ports on the switch
D. Configure them only after you configure linkup and linkdown traps
Which connecting endpoints are evaluated against all enabled device profiling rules?
A. Known trusted devices each time they change location
B. Rogues devices, each time they connect
C. Rogues devices, only when they connect for the first time
D. All hosts, each time they connect
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?
A. The port is added to the Forced Registration group.
B. The port is disabled.
C. The port is switched into the Dead-End VLAN.
D. The port becomes a threshold uplink.
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)
A. Persistent
B. Dissolvable
C. Mobile
D. Passive
Where are logical network values defined?
A. On the profiled devices view
B. In the port properties view of each port
C. In the model configuration view of each infrastructure device
D. In the security and access field of each host record
When you create a user or host profile; which three criteria can you use? (Choose three.)
A. An applied access policy
B. Administrative group membership
C. Location
D. Host or user group memberships
E. Host or user attributes
With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
A. The host is provisioned based on the network access policy.
B. The host is provisioned based on the default access defined by the point of connection.
C. The host is isolated.
D. The host is administratively disabled.
Which three of the following are components of a security rule? (Choose three.)
A. Methods
B. User or host profile
C. Security String
D. Trigger
E. Action
What capability do logical networks provide?
A. VLAN-based inventory reporting
B. Interactive topology view diagrams
C. Application of different access values from a single access policy
D. Autopopulation of device groups based on point of connection