Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)
A. SNMP
B. RADIUS
C. FTP
D. CLI
E. SMTP
Which agent is used only as part of a login script?
A. Persistent
B. Passive
C. Mobile
D. Dissolvable
Which command line shell and scripting language does FortiNAC use for WinRM?
A. Powershell
B. Bash
C. Linux
D. DOS
Refer to the exhibit, and then answer the question below.
Which host is rogue?
A. 4
B. 2
C. 3
D. 1
When you create a user or host profile; which three criteria can you use? (Choose three.)
A. An applied access policy
B. Administrative group membership
C. Location
D. Host or user group memberships
E. Host or user attributes
What capability do logical networks provide?
A. VLAN-based inventory reporting
B. Interactive topology view diagrams
C. Application of different access values from a single access policy
D. Autopopulation of device groups based on point of connection
Which agent can receive and display messages from FortiNAC to the end user?
A. Persistent
B. Passive
C. MDM
D. Dissolvable
Refer to the exhibit.
If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what will occur?
A. No VLAN change is performed.
B. The host is disabled.
C. The host is moved to VLAN 111.
D. The host is moved to a default isolation VLAN.
In an isolation VLAN, which three services does FortiNAC supply? (Choose three.)
A. DNS
B. NTP
C. SMTP
D. DHCP
E. Web
Where do you look to determine when and why the FortiNAC made an automated network access change?
A. The Admin Auditing view
B. The Event view
C. The Connections view
D. The Port Changes view