Free NSE6_FNC-8.5 Exam Braindumps (page: 3)

Page 2 of 8

How are logical networks assigned to endpoints?

  1. Through device profiling rules
  2. Through network access policies
  3. Through Layer 3 polling configurations
  4. Through FortiGate IPv4 policies

Answer(s): D



Which system group will force at-risk hosts into the quarantine network, based on point of connection?

  1. Forced Isolation
  2. Physical Address Filtering
  3. Forced Quarantine
  4. Forced Remediation

Answer(s): A



Which three of the following are components of a security rule? (Choose three.)

  1. Security String
  2. Methods
  3. Action
  4. User or host profile
  5. Trigger

Answer(s): A,B,D




Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)

  1. Passive
  2. Dissolvable
  3. Mobile
  4. Persistent

Answer(s): C,D






Post your Comments and Discuss Fortinet NSE6_FNC-8.5 exam with other Community members:

NSE6_FNC-8.5 Discussions & Posts