Refer to the exhibit.
Based on the settings shown in the exhibit what action will FortiClient take when it detects that a user is trying to download an infected file?
A. Blocks the infected files as it is downloading
B. Quarantines the infected files and logs all access attempts
C. Sends the infected file to FortiGuard for analysis
D. Allows the infected file to download without scan
An administrator deploys a FortiClient installation through the Microsoft AD group policy After installation is
complete all the custom configuration is missing.
What could have caused this problem?
A. The FortiClient exe file is included in the distribution package
B. The FortiClient MST file is missing from the distribution package
C. FortiClient does not have permission to access the distribution package.
D. The FortiClient package is not assigned to the group
Refer to the exhibits.
Based on the FortiGate Security Fabric settings shown in the exhibits, what must an administrator do on the EMS server to successfully quarantine an endpoint. when it is detected as a compromised host (loC)?
A. The administrator must enable remote HTTPS access to EMS.
B. The administrator must enable FQDN on EMS.
C. The administrator must authorize FortiGate on FortiAnalyzer.
D. The administrator must enable SSH access to EMS.
Refer to the exhibit.
Based on the Security Fabric automation settings, what action will be taken on compromised endpoints?
A. Endpoints will be quarantined through EMS
B. Endpoints will be banned on FortiGate
C. An email notification will be sent for compromised endpoints
D. Endpoints will be quarantined through FortiSwitch
A new chrome book is connected in a schools network
Which component can the EMS administrator use to manage the FortiClient web filter extension installed on the Google Chromebook endpoint?
A. FortiClient customer URL list
B. FortiClient web filter extension
C. FortiClient EMS
D. FortiClient site categories
A FortiClient EMS administrator has enabled compliance rule for the sales department Which Fortmet device will enforce compliance with dynamic access control?
A. FortiClient EMS
B. FortiAnalyzer
C. FortiGate
D. FortiClient
Which two third-party tools can an administrator use to deploy FortiClient? (Choose two )
A. Microsoft SCCM
B. Microsoft Active Directory GPO
C. MSI Editor
D. Microsoft Windows Installer
What does FortiClient do as a fabric agent? (Choose two )
A. Provides application inventory
B. Provides IOC verdicts
C. Automates Responses
D. Creates dynamic policies
Which three features does FortiClient endpoint security include? (Choose three )
A. L2TP
B. Real-time protection
C. DLP
D. Vulnerability management
E. IPsec
What is the function of the quick scan option on FortiClient?
A. It performs a full system scan including all files, executable files, DLLs, and drivers for threats.
B. It scans executable files. DLLs, and drivers that are currently running, for threats.
C. It allows users to select a specific file folder on your local hard disk drive (HDD), to scan for threats
D. It scans programs and drivers that are currently running for threats
Refer to the exhibit.
Based on the settings shown in the exhibit, which two actions must the administrator take to make the endpoint compliant? (Choose two)
A. Integrate FortiSandbox for infected file analysis.
B. Enable the webfilter profile
C. Patch applications that have vulnerability rated as high or above.
D. Run Calculator application on the endpoint.
Which statement about FortiClient enterprise management server is true?
A. It provides centralized management of FortiGate devices.
B. lt provides centralized management of multiple endpoints running FortiClient software.
C. It provides centralized management of FortiClient Android endpoints only.
D. It provides centralized management of Chromebooks running real-time protection
When site categories are disabled on FortiClient webfilter and AV (malicious websites), which feature protects the endpoint?
A. Web Exclusion list
B. Endpoint host file
C. FortiSandbox URL list
D. Block malicious websites on Antivirus
Refer to the exhibit.
Based on the FortiClient logs shown in the exhibit which application is blocked by the application firewall?
A. Twitter
B. Facebook
C. Internet Explorer
D. Firefox
An administrator installs FortiClient on Windows Server. What is the default behavior of real-time protection control?
A. Real-time protection must update AV signature database
B. Real-time protection sends malicious files to FortiSandbox when the file is not detected locally
C. Real-time protection is disabled
D. Real-time protection must update the signature database from FortiSandbox