Which three are components of a security rule? (Choose three.)
Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)
While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.
Where would the administrator look to determine when and why FortiNAC made the network access change?
What agent is required in order to detect an added USB drive?
Refer to the exhibit, and then answer the question below.
Which host is rogue?
Which agent is used only as part of a login script?
Where are logical network values defined?
Refer to the exhibit.
Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?
Where do you look to determine when and why the FortiNAC made an automated network access change?
An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?
Refer to the exhibit.
If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?
When you create a user or host profile; which three criteria can you use? (Choose three.)