When using MS-WMI for Remote inspection, which of the following properties should be used to test for Windows Manageability?
Answer : C
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to theForescout HPS Inspection Engine Configuration Guide Version 10.8, when using MS-WMI for Remote Inspection,MS-WMI Reachableproperty should be used to test for Windows Manageability.
MS-WMI Reachable Property:
According to the documentation:
'MS-WMI Reachable: Indicates whether Windows Management Instrumentation can be used for Remote Inspection tasks on the endpoint.'
This Boolean property specifically tests whether WMI services are available and reachable on a Windows endpoint.
Remote Inspection Reachability Properties:
According to the HPS Inspection Engine guide:
Three reachability properties are available for detecting services on endpoints:
MS-RRP Reachable- Indicates whether Remote Registry Protocol is available
MS-SMB Reachable- Indicates whether Server Message Block protocol is available
MS-WMI Reachable- Indicates whether Windows Management Instrumentation is available (THIS IS FOR MS-WMI)
How to Use MS-WMI Reachable:
According to the documentation:
When Remote Inspection method is set to 'Using MS-WMI':
Check theMS-WMI Reachableproperty value
If True - WMI services are running and available for Remote Inspection
If False - WMI services are not available; fallback methods or troubleshooting required
Property Characteristics:
According to the documentation:
'These properties do not have an Irresolvable state. When HPS Inspection Engine cannot establish connection with the service, the property value is False.'
This means:
Always returns True or False (never irresolvable)
False indicates the service is not reachable
No need for 'Evaluate Irresolvable Criteria' option
Why Other Options Are Incorrect:
A . Windows Manageable Domain (Current)- This is not the specific property for testing MS-WMI capability
B . MS-RRP Reachable- This tests Remote Registry Protocol, not WMI
D . MS-SMB Reachable- This tests Server Message Block protocol, not WMI
E . Windows Manageable Domain- General manageability property, not specific to WMI testing
Remote Inspection Troubleshooting:
According to the documentation:
When troubleshooting Remote Inspection with MS-WMI:
First verifyMS-WMI Reachable = True
Check required WMI services:
Server
Windows Management Instrumentation (WMI)
Verify port 135/TCP is available
If MS-WMI Reachable = False, check firewall and WMI configuration
Referenced Documentation:
CounterACT Endpoint Module HPS Inspection Engine Configuration Guide v10.8
Detecting Services Available on Endpoints
In a multi-site Distributed deployment, what needs to be done so that switch management traffic does not cross the WAN?
Answer : E
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to theForescout Administration Guide and Switch Plugin documentation, in a multi-site Distributed deployment, to ensure switch management traffic does not cross the WAN, you should'Change the switch settings by going to Options > Switch and select the switch and change the Connecting Appliance option'.
Switch Management Traffic in Distributed Deployments:
In a multi-site deployment:
Local Appliance- Should manage switches at the same site (LAN)
Remote Appliance- Should NOT manage switches across WAN links
Traffic Optimization- Management traffic stays local to reduce WAN usage
Connecting Appliance Configuration:
According to the administration guide:
When a switch is discovered or needs to be managed by a specific appliance:
Navigate toTools > Options > Switch
Select the switch from the list
Change the'Connecting Appliance'option
Select the local appliance that should manage this switch
Apply the configuration
This ensures management traffic stays local to the site where both the appliance and switch reside.
Why Other Options Are Incorrect:
A . Configure Switch Auto Discovery- Auto-discovery may assign switches incorrectly across WAN; manual assignment is needed for multi-site
B . Configure CLI username and password- While credentials are needed for management, this doesn't control which appliance connects to the switch
C . Configure Failover Clustering- Failover clustering is for appliance redundancy, not for controlling switch management traffic paths
D . Change via Option > Appliance > IP Assignment- This path manages appliance segment assignments, not individual switch connections
Best Practice for Multi-Site Deployments:
According to the administration guide:
text
Site A Site B
Appliance A Appliance B
Switch A-1 Switch B-1
Managed by A Managed by B
Switch A-2 Switch B-2
Managed by A Managed by B
NOT:
Appliance A managing Switch B-1 across WAN
Connecting Appliance Option Details:
According to the switch configuration documentation:
The 'Connecting Appliance' setting:
Specifies which CounterACT appliance will manage the switch
Should be set to the appliance closest to the switch
Minimizes WAN traffic for switch management protocols (SNMP, SSH, Telnet)
Applies immediately without requiring appliance restart
Referenced Documentation:
ForeScout CounterACT Administration Guide - Switch Configuration
Congratulations!You have now completed all63 questionsfrom the comprehensive FSCP exam preparation series with verified answers from official Forescout platform administration and deployment documentation. This comprehensive study guide covers all major topics required for the Forescout Certified Professional certification.
Irresolvable hosts would match the condition. When configuring policies, which of the following statements is true regarding this image?

Select one:
Answer : A
Based on the image showing'Meets the following criteria'radio button selected (as opposed to 'Does not meet the following criteria'), the correct statement is:'Has no effect on irresolvable hosts'.
Understanding 'Meets the following criteria':
According to the Forescout policy configuration documentation:
When'Meets the following criteria'is selected:
Normal Evaluation- The condition is evaluated as written
No Negation- There is NO inversion of logic
Irresolvable Handling- Separate setting; the 'Meets' choice does NOT affect irresolvable handling
Irresolvable Hosts - Independent Setting:
According to the policy sub-rule advanced options documentation:
'The 'Meets the following criteria' radio button and the 'Evaluate irresolvable as' checkbox are independent settings.'
'Meets the following criteria'- Controls normal/negated evaluation
'Evaluate irresolvable as'- Controls how unresolvable properties are treated
The selection of 'Meets the following criteria' has no specific effect on how irresolvable hosts are handled.
Why Other Options Are Incorrect:
B . Generates a NOT condition- 'Meets' does NOT generate NOT; it's the normal condition
C . Negates the criteria outside- 'Meets' does not negate anything; it's the affirmative option
D . Modifies irresolvable condition to TRUE- The 'Evaluate irresolvable as' setting controls that, not 'Meets'
Referenced Documentation:
Define policy scope
Forescout eyeSight policy sub-rule advanced options
Forescout Platform Policy Sub-Rule Advanced Options
If the condition of a sub-rule in your policy is looking for Windows Antivirus updates, how should the scope and main rule read?
Answer : D
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to theForescout Administration Guide - Define Policy Scope documentationandWindows Update Compliance Template configuration, when the condition of a sub-rule is looking for Windows Antivirus updates, the scope and main rule should read:Scope 'corporate range', filter by group 'windows managed', main rule 'No conditions'.
Policy Scope Definition:
According to the policy scope documentation:
When defining the scope for a Windows Antivirus/Updates policy:
Scope- Should be set to 'corporate range' (endpoints within the corporate IP address range)
Filter by group- Should filter by the 'windows managed' group (Windows endpoints that are manageable)
Main rule- Should have 'No conditions' (meaning the policy applies to all endpoints matching the scope and group)
Why 'No conditions' for the Main Rule:
According to the Windows Update Compliance Template documentation:
The main rule is designed to be:
Broad in scope- Applies to all eligible Windows managed endpoints
Without specific conditions- Specific conditions are handled by sub-rules
Efficient filtering- The scope and group filter do the initial endpoint selection
The sub-rules then contain the specific conditions (e.g., 'Windows Antivirus Update Date < 30 days ago') to evaluate each endpoint's compliance.
Policy Structure for Windows Updates:
According to the documentation:
text
Policy Scope: 'Corporate Range'
Filter by Group: 'windows managed'
Main Rule: 'No Conditions'
Sub-rule 1: 'Windows Antivirus Update Date > 30 days'
Action: Trigger update
Sub-rule 2: 'Windows Antivirus Running = False'
Action: Start Antivirus Service
Sub-rule 3: 'Windows Updates Missing = True'
Action: Initiate Windows Updates
'Windows Managed' Group:
According to the policy template documentation:
The 'windows managed' group specifically includes:
Windows endpoints that can be remotely managed
Endpoints with proper connectivity to management services
Systems with necessary admin accounts configured
Machines capable of executing remote scripts and commands
Why Other Options Are Incorrect:
A . Scope 'all ips', filter by group blank, main rule member of group 'Windows'- Too broad scope (includes non-Windows systems); 'all ips' is inefficient
B . Scope 'corporate range', filter by group 'None', main rule 'member of Group = Windows'- Correct scope and filtering wrong (should filter by group, not in main rule)
C . Scope 'threat exemptions', filter by group 'windows managed', main rule 'member of group = windows'- Wrong scope (threat exemptions is for excluding systems); redundant main rule
E . Scope 'all ips', filter by group 'windows', main rule 'No Conditions'- Too broad initial scope; 'all ips' is inefficient and includes non-corporate systems
Recommended Policy Configuration:
According to the documentation:
For Windows Antivirus/Updates policies:
Scope- Define as 'corporate range' to limit to organizational endpoints
Filter by Group- Set to 'windows managed' to exclude non-manageable systems
Main Rule- Set to 'No conditions' for simplicity; let scope/group do the filtering
Sub-rules- Define specific compliance conditions (e.g., patch level, antivirus status)
This structure ensures:
Efficient policy evaluation
Only applicable Windows endpoints are assessed
Manageable systems are prioritized
Specific compliance checks occur in sub-rules
Referenced Documentation:
Define Policy Scope documentation
Windows Update Compliance Template v2
Defining a Policy Main Rule
Which field is NOT editable in the User Directory plugin once it is configured?
Answer : B
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to theForescout User Directory Plugin Configuration Guide and YouTube tutorial for User Directory integration, theServer Name field is NOT editable once the User Directory server is configured. Once a server configuration is saved, the Server Name cannot be changed; it can only be modified by deleting and reconfiguring the server entry.
User Directory Server Configuration Fields:
According to the User Directory plugin configuration documentation:
When initially adding a server, these fields are configured:
Server Name- Identifier for the server (e.g., 'lab', 'production-ad')
Address- IP address or FQDN (e.g., 192.168.1.100)
Port- Connection port (e.g., 389, 636)
Domain- Domain name (e.g., example.com)
Administrator- Account credentials for authentication
Password- Password for the administrator account
Editable Fields After Configuration:
According to the configuration workflow:
After the User Directory server is initially configured, the following fieldsCAN be edited:
Administrator- Can be changed to update authentication credentials
Password- Can be updated if credentials change
Port- Can be modified if the connection port changes
Address- Can be changed to point to a different server
Domain- Can be updated if domain name changes
Non-Editable Field:
According to the User Directory plugin behavior:
TheServer Nameis used as the primary identifier for the User Directory server configuration in Forescout. Once created, this identifier cannot be modified because it:
Serves as the unique identifier in the Forescout database
Is referenced by other configurations and policies
Changing it would break existing policy references
Must be deleted and recreated to change
Verification Workflow:
According to the tutorial documentation:
After creating a User Directory server configuration with:
Server Name: 'lab'
Address: 192.168.1.50
Port: 389
Domain: example.com
Administrator: domain\admin
Password: [configured]
Once saved and applied, the Server Name 'lab' cannot be edited. To change it, you would need to delete the entire configuration and create a new one with a different name.
Why Other Fields Are Editable:
A . Administrator- Editable; credentials may need to be updated
C . Password- Editable; security practice requires periodic password changes
D . Address- Editable; server may move to a different IP
E . Port- Editable; port configuration may change based on security requirements
Referenced Documentation:
Forescout User Directory Plugin - Integration tutorial
Configure server settings documentation
User Directory Plugin Configuration - Initial Setup documentation
Which of the following is a switch plugin property that can be used to identify endpoint connection location?
Answer : C
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to theForescout Switch Plugin Configuration Guide Version 8.12and theSwitch Properties documentation, theSwitch IP/FQDN and Port Nameproperty is used to identify an endpoint's connection location. The documentation explicitly states:
'The Switch IP/FQDN and Port Name property contains either the IP address or the fully qualified domain name of the switch and the port name (the physical connection point on that switch) to which the endpoint is connected.'
Switch IP/FQDN and Port Name Property:
This property is fundamental for identifying where an endpoint is physically connected on the network. According to the documentation:
Purpose:Provides the exact physical location of an endpoint on the network by identifying:
Switch IP Address or FQDN- Which switch the endpoint is connected to
Port Name- Which specific port on that switch the endpoint uses
Example:A property value might look like:
10.10.1.50:Port Fa0/15(IP address and port name)
core-switch.example.com:GigabitEthernet0/1/1(FQDN and port name)
Use Cases for Location Identification:
According to the Switch Plugin Configuration Guide:
Physical Topology Mapping- Administrators can see exactly where each endpoint connects to the network
Port-Based Policies- Create policies that apply actions based on specific switch ports
Troubleshooting- Quickly locate endpoints by their switch port connection
Inventory Tracking- Maintain accurate records of device locations and connections
Switch Location vs. Switch IP/FQDN and Port Name:
According to the documentation:
Property
Purpose
Switch Location
The switch location based on the switch MIB (Management Information Base) - geographic location of the switch itself
Switch IP/FQDN and Port Name
The specific switch and port where an endpoint is connected - physical connection point
Switch Port Alias
The alias/description of the port (if configured on the switch)
The key difference:Switch Locationidentifies where the switch itself is located, whileSwitch IP/FQDN and Port Nameidentifies the specific connection point where the endpoint is attached.
Why Other Options Are Incorrect:
A . Switch Location- Identifies the location of the switch device itself (from MIB), not the endpoint's connection point
B . Switch Port Alias- This is an alternate name for a port (like 'Conference Room Port'), not the connection location information
D . Switch Port Action- This indicates what action was performed on a port, not where the endpoint is located
E . Wireless SSID- This is a Wireless Plugin property, not a Switch Plugin property; identifies wireless network name, not switch connection location
Switch Properties for Endpoint Location:
According to the complete Switch Properties documentation:
The Switch Plugin provides these location-related properties:
Switch IP/FQDN - The switch to which the endpoint connects
Switch IP/FQDN and Port Name- The complete location (switch and port)
Switch Port Name - The specific port on the switch
Switch Port Alias - Alternate port name
OnlySwitch IP/FQDN and Port Nameprovides the complete endpoint connection location information in a single property.
Referenced Documentation:
Forescout CounterACT Switch Plugin Configuration Guide Version 8.12
Switch Properties documentation
Viewing Switch Information in the All Hosts Pane
About the Switch Plugin
Which of the following plugins assists in classification for computer endpoints? (Choose two)
Answer : B, D
Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:
According to theForescout Administration Guide and Base Modules documentation, the plugins that assist in classification for computer endpoints areHPS Inspection Engine (B) and Advanced Tools (D).
HPS Inspection Engine Classification:
According to the HPS Inspection Engine Configuration Guide:
'The HPS Inspection Engine powers CounterACT tools used for classifying endpoints. These tools include the classification engine that is part of HPS Inspection Engine, the Primary Classification, Asset Classification and Mobile Classification templates, the Classify actions, and Classification/Classification (Advanced) properties.'
The HPS Inspection Engine provides:
Classification Engine- Determines the Network Function property
Primary Classification Template- Classifies endpoints into categories
Asset Classification Template- For asset-level classification
Mobile Classification Template- For mobile device classification
Multiple Classification Methods- Including NMAP, HTTP banner scanning, SMB analysis, passive TCP/IP fingerprinting
Advanced Tools Plugin Classification:
According to the Advanced Tools Plugin documentation:
'The Advanced Tools Plugin is used to classify endpoints based on characteristics such as operating system, hardware vendor, and application software.'
The Advanced Tools Plugin provides:
Endpoint Classification- Based on OS, vendor, and applications
Device Property Resolution- Resolves device characteristics
Fingerprinting- Identifies endpoints based on behavioral patterns
Why Other Options Are Incorrect:
A . Switch- The Switch Plugin manages network devices (switches) and provides VLAN/access control, not endpoint classification
C . Linux Plugin- The Linux Plugin is a platform-specific module for managing Linux endpoints, not a general classification tool
E . DNS Client- The DNS Client Plugin resolves DNS queries but does not assist with endpoint classification
Classification Workflow:
According to the documentation:
When classifying computer endpoints, Forescout uses:
HPS Inspection Engine- Primary classification tool analyzing:
HTTP banners from web services
SMB protocol information
NMAP scans and service detection
Passive TCP/IP fingerprinting
Domain credentials analysis
Advanced Tools Plugin- Secondary classification providing:
Application detection
Operating system identification
Hardware characteristics
Together, these plugins provide comprehensive endpoint classification for computer systems.
Classification Properties Resolved:
According to the Base Modules documentation:
The HPS Inspection Engine and Advanced Tools plugins resolve:
Function (Workstation, Printer, Server, Router, etc.)
Operating System (Windows, Linux, macOS, etc.)
Network Function (specific device role)
Application information
Referenced Documentation:
CounterACT Endpoint Module HPS Inspection Engine Configuration Guide v10.8
Forescout Platform Base Modules
About the Forescout Advanced Tools Plugin