Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

NSE6_FNC-9.1 Exam Dumps - Fortinet Certification Questions and Answers

Question # 4

Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)

Options:

A.

Agent technology

B.

Portal page on-boarding options

C.

MDM integration

D.

Application layer traffic inspection

Buy Now
Question # 5

Refer to the exhibit.

If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?

Options:

A.

The host is moved to VLAN 111.

B.

The host is moved to a default isolation VLAN.

C.

No VLAN change is performed.

D.

The host is disabled.

Buy Now
Question # 6

By default, if after a successful Layer 2 poll, more than 20 endpoints are seen connected on a single switch port simultaneously, what happens to the port?

Options:

A.

The port becomes a threshold uplink

B.

The port is disabled

C.

The port is added to the Forced Registration group

D.

The port is switched into the Dead-End VLAN

Buy Now
Question # 7

Which two of the following are required for endpoint compliance monitors? (Choose two.)

Options:

A.

Persistent agent

B.

Logged on user

C.

Security rule

D.

Custom scan

Buy Now
Question # 8

View the command and output.

What is the state of database replication?

Options:

A.

Secondary to primary synchronization failed.

B.

Primary to secondary synchronization failed.

C.

Secondary to primary synchronization was successful.

D.

Primary to secondary database synchronization was successful.

Buy Now
Question # 9

Which group type can have members added directly from the FortiNAC Control Manager?

Options:

A.

Administrator

B.

Device

C.

Port

D.

Host

Buy Now
Question # 10

Which three are components of a security rule? (Choose three.)

Options:

A.

Methods

B.

Security String

C.

Trigger

D.

User or host profile

E.

Action

Buy Now
Question # 11

What agent is required in order to detect an added USB drive?

Options:

A.

Persistent

B.

Dissolvable

C.

Mobile

D.

Passive

Buy Now
Question # 12

With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?

Options:

A.

The host is provisioned based on the default access defined by the point of connection.

B.

The host is provisioned based on the network access policy.

C.

The host is isolated.

D.

The host is administratively disabled.

Buy Now
Question # 13

In an isolation VLAN which three services does FortiNAC supply? (Choose three.)

Options:

A.

NTP

B.

DHCP

C.

Web

D.

DNS

E.

ISMTP

Buy Now
Exam Code: NSE6_FNC-9.1
Exam Name: Fortinet NSE 6 - FortiNAC 9.1
Last Update: Feb 12, 2025
Questions: 47
NSE6_FNC-9.1 pdf

NSE6_FNC-9.1 PDF

$29.75  $84.99
NSE6_FNC-9.1 Engine

NSE6_FNC-9.1 Testing Engine

$33.25  $94.99
NSE6_FNC-9.1 PDF + Engine

NSE6_FNC-9.1 PDF + Testing Engine

$47.25  $134.99