How are logical networks assigned to endpoints?
B
By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single
switch port simultaneously, what happens to the port?
A
An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this
result?
C
Which three communication methods are used by FortiNAC to gather information from and control,
infrastructure devices? (Choose three.)
ACE
Explanation:
FortiNAC Study Guide 7.2 | Page 11
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the
configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
B
Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)
B, C
During the on-boarding process through the captive portal, what are two reasons why a host that
successfully registered would remain stuck in the Registration VLAN? (Choose two.)
B, D
When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?
A
In a wireless integration, what method does FortiNAC use to obtain connecting MAC address
information?
B
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)
B, D