In which view would you find who made modifications to a Group?
During an evaluation of state-based enforcement, an administrator discovers that ports that should not be under enforcement have been added to enforcement groups. In which view would the administrator be able to determine who added the ports to the groups?
During the on-boarding process through the captive portal, what are two reasons why a host that successfully registered would remain stuck in the Registration VLAN? (Choose two.)
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)
Which agent can receive and display messages from FortiNAC to the end user?
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
Which agent is used only as part of a login script?
Where do you look to determine which network access policy, if any is being applied to a particular host?
Which three are components of a security rule? (Choose three.)
What causes a host's state to change to "at risk"?
Where do you look to determine when and why the FortiNAC made an automated network access change?
What agent is required in order to detect an added USB drive?
What would happen if a port was placed in both the Forced Registration and the Forced Remediation port groups?
Refer to the exhibit, and then answer the question below.
Which host is rogue?
When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?
In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?