A FortiClient EMS administrator has enabled the compliance rule for the sales department. Which Fortinet device will enforce compliance with dynamic access control?
A. FortiClient
B. FortiClient EMS
C. FortiGate
D. FortiAnalyzer
Refer to the exhibit.
Based on the Security Fabric automation settings, what action will be taken on compromised endpoints?
A. Endpoints will be quarantined through EMS
B. Endpoints will be banned on FortiGate
C. An email notification will be sent for compromised endpoints
D. Endpoints will be quarantined through FortiSwitch
Which component or device shares device status information through ZTNA telemetry?
A. FortiClient
B. FortiGate
C. FortiGate Access Proxy
D. FortiClient EMS
What is the function of the quick scan option on FortiClient?
A. It scans programs and drivers that are currently running, for threats.
B. It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats.
C. It performs a full system scan including all files, executable files, DLLs, and drivers for threats.
D. It scans executable files, DLLs, and drivers that are currently running, for threats.
An administrator configures ZTNA configuration on the FortiGate for remote users. Which statement is true about the firewall policy?
A. It enforces access control
B. It redirects the client request to the access proxy
C. It defines the access proxy
D. It applies security profiles to protect traffic
Which two VPN types can a FortiClient endpoint user inmate from the Windows command prompt? (Choose two)
A. L2TP
B. PPTP
C. IPSec
D. SSL VPN
Which two third-party tools can an administrator use to deploy FortiClient? (Choose two.)
A. Microsoft Windows Installer
B. Microsoft SCCM
C. Microsoft Active Directory GPO
D. QR code generator
Which two statements are true about ZTNA? (Choose two.)
A. ZTNA provides role-based access
B. ZTNA manages access for remote users only
C. ZTNA manages access through the client only
D. ZTNA provides a security posture check
An administrator is required to maintain a software inventory on the endpoints. without showing the feature on the FortiClient dashboard What must the administrator do to achieve this requirement?
A. The administrator must use default endpoint profile
B. The administrator must not select the vulnerability scan feature in the deployment package.
C. The administrator must select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile
D. The administrator must click the hide icon on the vulnerability scan tab
Refer to the exhibit.
Based on the settings shown in the exhibit what action will FortiClient take when it detects that a user is trying to download an infected file?
A. Blocks the infected files as it is downloading
B. Quarantines the infected files and logs all access attempts
C. Sends the infected file to FortiGuard for analysis
D. Allows the infected file to download without scan