Which port group membership should you enable on FortiNAC to isolate rogue hosts'?
Options:
A.
Forced Authentication
B.
Forced Registration
C.
Forced Remediation
D.
Reset Forced Registration
Answer:
C
Explanation:
Explanation:
In FortiNAC, to isolate rogue hosts, you should enable the:
C. Forced Remediation: This port group membership is used to isolate hosts that have been determined to be non-compliant or potentially harmful. It enforces a remediation process on the devices in this group, often by placing them in a separate VLAN or network segment where they have limited or no access to the rest of the network until they are remediated.
The other options are not specifically designed for isolating rogue hosts:
A. Forced Authentication: This is used to require devices to authenticate before gaining network access.
B. Forced Registration: This group is used to ensure that all devices are registered before they are allowed on the network.
D. Reset Forced Registration: This is used to reset the registration status of devices, not to isolate them.
Question 9
Which two types of configuration can you associate with a user/host profile on FortiNAC? (Choose two.)
Options:
A.
Service Connectors
B.
Network Access
C.
Inventory
D.
Endpoint compliance
Answer:
B, D
Explanation:
Explanation:
User/host profiles are used to map sets of hosts and users to different types of policies or rules on FortiNAC. Among the options given, network access and endpoint compliance are the two types of configuration that can be associated with a user/host profile. Network access configuration determines the VLAN, CLI configuration or VPN group that is assigned to a host or user based on their profile. Endpoint compliance configuration defines the policies that checkthe host or user for compliance status, such as antivirus, firewall, patch level, etc. Service connectors and inventory are not types of configuration, but features of FortiNAC that allow integration with other services and devices, and collection of host and user data, respectively. References := User/host profiles | FortiNAC 9.4.0 - Fortinet Documentation and User/host profiles | FortiNAC 9.4.0 - Fortinet Documentation