Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)
A. SNMP
B. RADIUS
C. FTP
D. CLI
E. SMTP
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
A. A matched security policy
B. Scheduled poll timings
C. Linkup and Linkdown traps
D. Manual polling
E. A failed Layer 3 poll
In a wireless integration, how does FortiNAC obtain connecting MAC address information?
A. Link traps
B. End station traffic monitoring
C. MAC notification traps
D. RADIUS
Which system group will force at-risk hosts into the quarantine network, based on point of connection?
A. Forced Quarantine
B. Forced Remediation
C. Forced Isolation
D. Physical Address Filtering
Which agent is used only as part of a login script?
A. Persistent
B. Passive
C. Mobile
D. Dissolvable
Which command line shell and scripting language does FortiNAC use for WinRM?
A. Powershell
B. Bash
C. Linux
D. DOS
When you create a user or host profile; which three criteria can you use? (Choose three.)
A. An applied access policy
B. Administrative group membership
C. Location
D. Host or user group memberships
E. Host or user attributes
What causes a host's state to change to "at risk"?
A. The host has been administratively disabled.
B. The logged on user is not found in the Active Directory.
C. The host has failed an endpoint compliance policy or admin scan.
D. The host is not in the Registered Hosts group.
Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
A. Agent technology
B. MDM integration
C. Portal page on-boarding options
D. Application layer traffic inspection
Which agent can receive and display messages from FortiNAC to the end user?
A. Persistent
B. Passive
C. MDM
D. Dissolvable