Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)
Answer(s): A,B
To allow FortiNAC to process incoming syslog messages from an unknown vendor, two steps must be taken:Creation of a customized event parser: This enables FortiNAC to parse and integrate syslog messages from any vendor or device, as long as the messages are in CSV, CEF, or Tag/Value format. Modeling the device in the Topology view: Any device that sends syslog messages to FortiNAC must be modeled in this view. FortiNAC will not process syslog or trap messages unless the source address belongs to a device modeled in the topology.ReferenceFortiNAC 7.2 Study Guide, pages 428 and 399
Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
Answer(s): A,C
To gather a list of installed applications and application details from a host, two methods can be used:Agent technology: FortiNAC uses agent technology to collect all installed applications on an endpoint.Integration with MDMs (Mobile Device Management systems): M, D, Ms that support application gathering can be integrated with FortiNAC to collect application information.ReferenceFortiNAC 7.2 Study Guide, page 302
Which devices would be evaluated by device profiling rules?
Answer(s): B
Device profiling rules in FortiNAC are used to evaluate and classify rogue devices. These rules can be configured to automatically, manually, or through sponsorship evaluate and classify unknown untrusted devices as they are identified and created.ReferenceFortiNAC 7.2 Study Guide, page 98
Which three are components of a security rule? (Choose three.)
Answer(s): C,D,E
Components of a security rule in FortiNAC include:Trigger: The condition or event that initiates the evaluation of the rule. User or Host Profile: A requirement that can be added to a rule to specify the user or host profile that must be matched.Action: The activities or responses that FortiNAC performs when the rule is matched.ReferenceFortiNAC 7.2 Study Guide, page 419
Post your Comments and Discuss Fortinet NSE6_FNC-7.2 exam with other Community members:
JD Commented on February 25, 2025 Does anyone really passed this exam in recent times using these exam dumps, If any please post your reply Anonymous
To protect our content from bots for real learners like you, we ask you to register for free. Sign in or sign up now to continue with the NSE6_FNC-7.2 material!