Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
Refer to the exhibit.
If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?
By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single switch port simultaneously, what happens to the port?
Which two of the following are required for endpoint compliance monitors? (Choose two.)
Which group type can have members added directly from the FortiNAC Control Manager?
With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
In an isolation VLAN which three services does FortiNAC supply? (Choose three.)