Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)
A. SNMP
B. RADIUS
C. FTP
D. CLI
E. SMTP
How should you configure MAC notification traps on a supported switch?
A. Configure them only on ports set as 802.1q trunks
B. Configure them on all ports except uplink ports
C. Configure them on all ports on the switch
D. Configure them only after you configure linkup and linkdown traps
Which connecting endpoints are evaluated against all enabled device profiling rules?
A. Known trusted devices each time they change location
B. Rogues devices, each time they connect
C. Rogues devices, only when they connect for the first time
D. All hosts, each time they connect
What agent is required in order to detect an added USB drive?
A. Mobile
B. Passive
C. Dissolvable
D. Persistent
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?
A. The port is added to the Forced Registration group.
B. The port is disabled.
C. The port is switched into the Dead-End VLAN.
D. The port becomes a threshold uplink.
In which view would you find who made modifications to a Group?
A. The Admin Auditing view
B. The Alarms view
C. The Event Management view
D. The Security Events view
Which agent is used only as part of a login script?
A. Persistent
B. Passive
C. Mobile
D. Dissolvable
When you create a user or host profile; which three criteria can you use? (Choose three.)
A. An applied access policy
B. Administrative group membership
C. Location
D. Host or user group memberships
E. Host or user attributes
In an isolation VLAN, which three services does FortiNAC supply? (Choose three.)
A. DNS
B. NTP
C. SMTP
D. DHCP
E. Web
Where do you look to determine when and why the FortiNAC made an automated network access change?
A. The Admin Auditing view
B. The Event view
C. The Connections view
D. The Port Changes view