Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)
A. SNMP
B. RADIUS
C. FTP
D. CLI
E. SMTP
Which connecting endpoints are evaluated against all enabled device profiling rules?
A. Known trusted devices each time they change location
B. Rogues devices, each time they connect
C. Rogues devices, only when they connect for the first time
D. All hosts, each time they connect
Where are logical network values defined?
A. On the profiled devices view
B. In the port properties view of each port
C. In the model configuration view of each infrastructure device
D. In the security and access field of each host record
Refer to the exhibit, and then answer the question below.
Which host is rogue?
A. 4
B. 2
C. 3
D. 1
When you create a user or host profile; which three criteria can you use? (Choose three.)
A. An applied access policy
B. Administrative group membership
C. Location
D. Host or user group memberships
E. Host or user attributes
Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
A. Agent technology
B. MDM integration
C. Portal page on-boarding options
D. Application layer traffic inspection
Refer to the exhibit.
If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what will occur?
A. No VLAN change is performed.
B. The host is disabled.
C. The host is moved to VLAN 111.
D. The host is moved to a default isolation VLAN.
In an isolation VLAN, which three services does FortiNAC supply? (Choose three.)
A. DNS
B. NTP
C. SMTP
D. DHCP
E. Web