Fortinet nse6-fnc-9-1 practice test

Exam Title: Fortinet NSE 6 - FortiNAC 9.1

Last update: Nov 27 ,2025
Question 1

How are logical networks assigned to endpoints?

  • A. Through device profiling rules
  • B. Through network access policies
  • C. Through Layer 3 polling configurations
  • D. Through FortiGate IPv4 policies
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single
switch port simultaneously, what happens to the port?

  • A. The port becomes a threshold uplink
  • B. The port is disabled
  • C. The port is added to the Forced Registration group
  • D. The port is switched into the Dead-End VLAN
Answer:

A


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this
result?

  • A. A security trigger activity
  • B. A security filter
  • C. An event to alarm mapping
  • D. An event to action mapping
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

Which three communication methods are used by FortiNAC to gather information from and control,
infrastructure devices? (Choose three.)

  • A. CLI
  • B. SMTP
  • C. SNMP
  • D. FTP
  • E. RADIUS
Answer:

ACE


Explanation:
FortiNAC Study Guide 7.2 | Page 11

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 5

An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the
configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

  • A. To deny access to only the production DNS server
  • B. To allow access to only the FortiNAC VPN interface
  • C. To allow access to only the production DNS server
  • D. To deny access to only the FortiNAC VPN interface
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)

  • A. Authentication
  • B. Network Access
  • C. Endpoint Compliance
  • D. Supplicant EasvConnect
Answer:

B, C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

During the on-boarding process through the captive portal, what are two reasons why a host that
successfully registered would remain stuck in the Registration VLAN? (Choose two.)

  • A. The wrong agent is installed.
  • B. The port default VLAN is the same as the Registration VLAN.
  • C. Bridging is enabled on the host.
  • D. There is another unregistered host on the same port.
Answer:

B, D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

When FortiNAC is managing FortiGate VPN users, why is an endpoint compliance policy necessary?

  • A. To confirm installed security software
  • B. To validate the VPN user credentials
  • C. To designate the required agent type
  • D. To validate the VPN client being used
Answer:

A


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

In a wireless integration, what method does FortiNAC use to obtain connecting MAC address
information?

  • A. SNMP traps
  • B. RADIUS
  • C. Endstation traffic monitoring D Link traps
Answer:

B


vote your answer:
A
B
C
A 0 B 0 C 0
Comments
Question 10

Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)

  • A. Dissolvable
  • B. Mobile
  • C. Passive
  • D. Persistent
Answer:

B, D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 4
Viewing questions 1-10 out of 47
Go To
page 2