Forescout Certified Professional FSCP Exam Questions

Page: 1 / 14
Total 80 questions
Question 1

When using MS-WMI for Remote inspection, which of the following properties should be used to test for Windows Manageability?



Answer : C

Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:

According to theForescout HPS Inspection Engine Configuration Guide Version 10.8, when using MS-WMI for Remote Inspection,MS-WMI Reachableproperty should be used to test for Windows Manageability.

MS-WMI Reachable Property:

According to the documentation:

'MS-WMI Reachable: Indicates whether Windows Management Instrumentation can be used for Remote Inspection tasks on the endpoint.'

This Boolean property specifically tests whether WMI services are available and reachable on a Windows endpoint.

Remote Inspection Reachability Properties:

According to the HPS Inspection Engine guide:

Three reachability properties are available for detecting services on endpoints:

MS-RRP Reachable- Indicates whether Remote Registry Protocol is available

MS-SMB Reachable- Indicates whether Server Message Block protocol is available

MS-WMI Reachable- Indicates whether Windows Management Instrumentation is available (THIS IS FOR MS-WMI)

How to Use MS-WMI Reachable:

According to the documentation:

When Remote Inspection method is set to 'Using MS-WMI':

Check theMS-WMI Reachableproperty value

If True - WMI services are running and available for Remote Inspection

If False - WMI services are not available; fallback methods or troubleshooting required

Property Characteristics:

According to the documentation:

'These properties do not have an Irresolvable state. When HPS Inspection Engine cannot establish connection with the service, the property value is False.'

This means:

Always returns True or False (never irresolvable)

False indicates the service is not reachable

No need for 'Evaluate Irresolvable Criteria' option

Why Other Options Are Incorrect:

A . Windows Manageable Domain (Current)- This is not the specific property for testing MS-WMI capability

B . MS-RRP Reachable- This tests Remote Registry Protocol, not WMI

D . MS-SMB Reachable- This tests Server Message Block protocol, not WMI

E . Windows Manageable Domain- General manageability property, not specific to WMI testing

Remote Inspection Troubleshooting:

According to the documentation:

When troubleshooting Remote Inspection with MS-WMI:

First verifyMS-WMI Reachable = True

Check required WMI services:

Server

Windows Management Instrumentation (WMI)

Verify port 135/TCP is available

If MS-WMI Reachable = False, check firewall and WMI configuration

Referenced Documentation:

CounterACT Endpoint Module HPS Inspection Engine Configuration Guide v10.8

Detecting Services Available on Endpoints


Question 2

In a multi-site Distributed deployment, what needs to be done so that switch management traffic does not cross the WAN?



Answer : E

Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:

According to theForescout Administration Guide and Switch Plugin documentation, in a multi-site Distributed deployment, to ensure switch management traffic does not cross the WAN, you should'Change the switch settings by going to Options > Switch and select the switch and change the Connecting Appliance option'.

Switch Management Traffic in Distributed Deployments:

In a multi-site deployment:

Local Appliance- Should manage switches at the same site (LAN)

Remote Appliance- Should NOT manage switches across WAN links

Traffic Optimization- Management traffic stays local to reduce WAN usage

Connecting Appliance Configuration:

According to the administration guide:

When a switch is discovered or needs to be managed by a specific appliance:

Navigate toTools > Options > Switch

Select the switch from the list

Change the'Connecting Appliance'option

Select the local appliance that should manage this switch

Apply the configuration

This ensures management traffic stays local to the site where both the appliance and switch reside.

Why Other Options Are Incorrect:

A . Configure Switch Auto Discovery- Auto-discovery may assign switches incorrectly across WAN; manual assignment is needed for multi-site

B . Configure CLI username and password- While credentials are needed for management, this doesn't control which appliance connects to the switch

C . Configure Failover Clustering- Failover clustering is for appliance redundancy, not for controlling switch management traffic paths

D . Change via Option > Appliance > IP Assignment- This path manages appliance segment assignments, not individual switch connections

Best Practice for Multi-Site Deployments:

According to the administration guide:

text

Site A Site B

Appliance A Appliance B

Switch A-1 Switch B-1

Managed by A Managed by B

Switch A-2 Switch B-2

Managed by A Managed by B

NOT:

Appliance A managing Switch B-1 across WAN

Connecting Appliance Option Details:

According to the switch configuration documentation:

The 'Connecting Appliance' setting:

Specifies which CounterACT appliance will manage the switch

Should be set to the appliance closest to the switch

Minimizes WAN traffic for switch management protocols (SNMP, SSH, Telnet)

Applies immediately without requiring appliance restart

Referenced Documentation:

ForeScout CounterACT Administration Guide - Switch Configuration

Congratulations!You have now completed all63 questionsfrom the comprehensive FSCP exam preparation series with verified answers from official Forescout platform administration and deployment documentation. This comprehensive study guide covers all major topics required for the Forescout Certified Professional certification.


Question 3

Irresolvable hosts would match the condition. When configuring policies, which of the following statements is true regarding this image?

Select one:



Answer : A

Based on the image showing'Meets the following criteria'radio button selected (as opposed to 'Does not meet the following criteria'), the correct statement is:'Has no effect on irresolvable hosts'.

Understanding 'Meets the following criteria':

According to the Forescout policy configuration documentation:

When'Meets the following criteria'is selected:

Normal Evaluation- The condition is evaluated as written

No Negation- There is NO inversion of logic

Irresolvable Handling- Separate setting; the 'Meets' choice does NOT affect irresolvable handling

Irresolvable Hosts - Independent Setting:

According to the policy sub-rule advanced options documentation:

'The 'Meets the following criteria' radio button and the 'Evaluate irresolvable as' checkbox are independent settings.'

'Meets the following criteria'- Controls normal/negated evaluation

'Evaluate irresolvable as'- Controls how unresolvable properties are treated

The selection of 'Meets the following criteria' has no specific effect on how irresolvable hosts are handled.

Why Other Options Are Incorrect:

B . Generates a NOT condition- 'Meets' does NOT generate NOT; it's the normal condition

C . Negates the criteria outside- 'Meets' does not negate anything; it's the affirmative option

D . Modifies irresolvable condition to TRUE- The 'Evaluate irresolvable as' setting controls that, not 'Meets'

Referenced Documentation:

Define policy scope

Forescout eyeSight policy sub-rule advanced options

Forescout Platform Policy Sub-Rule Advanced Options


Question 4

If the condition of a sub-rule in your policy is looking for Windows Antivirus updates, how should the scope and main rule read?



Answer : D

Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:

According to theForescout Administration Guide - Define Policy Scope documentationandWindows Update Compliance Template configuration, when the condition of a sub-rule is looking for Windows Antivirus updates, the scope and main rule should read:Scope 'corporate range', filter by group 'windows managed', main rule 'No conditions'.

Policy Scope Definition:

According to the policy scope documentation:

When defining the scope for a Windows Antivirus/Updates policy:

Scope- Should be set to 'corporate range' (endpoints within the corporate IP address range)

Filter by group- Should filter by the 'windows managed' group (Windows endpoints that are manageable)

Main rule- Should have 'No conditions' (meaning the policy applies to all endpoints matching the scope and group)

Why 'No conditions' for the Main Rule:

According to the Windows Update Compliance Template documentation:

The main rule is designed to be:

Broad in scope- Applies to all eligible Windows managed endpoints

Without specific conditions- Specific conditions are handled by sub-rules

Efficient filtering- The scope and group filter do the initial endpoint selection

The sub-rules then contain the specific conditions (e.g., 'Windows Antivirus Update Date < 30 days ago') to evaluate each endpoint's compliance.

Policy Structure for Windows Updates:

According to the documentation:

text

Policy Scope: 'Corporate Range'

Filter by Group: 'windows managed'

Main Rule: 'No Conditions'

Sub-rule 1: 'Windows Antivirus Update Date > 30 days'

Action: Trigger update

Sub-rule 2: 'Windows Antivirus Running = False'

Action: Start Antivirus Service

Sub-rule 3: 'Windows Updates Missing = True'

Action: Initiate Windows Updates

'Windows Managed' Group:

According to the policy template documentation:

The 'windows managed' group specifically includes:

Windows endpoints that can be remotely managed

Endpoints with proper connectivity to management services

Systems with necessary admin accounts configured

Machines capable of executing remote scripts and commands

Why Other Options Are Incorrect:

A . Scope 'all ips', filter by group blank, main rule member of group 'Windows'- Too broad scope (includes non-Windows systems); 'all ips' is inefficient

B . Scope 'corporate range', filter by group 'None', main rule 'member of Group = Windows'- Correct scope and filtering wrong (should filter by group, not in main rule)

C . Scope 'threat exemptions', filter by group 'windows managed', main rule 'member of group = windows'- Wrong scope (threat exemptions is for excluding systems); redundant main rule

E . Scope 'all ips', filter by group 'windows', main rule 'No Conditions'- Too broad initial scope; 'all ips' is inefficient and includes non-corporate systems

Recommended Policy Configuration:

According to the documentation:

For Windows Antivirus/Updates policies:

Scope- Define as 'corporate range' to limit to organizational endpoints

Filter by Group- Set to 'windows managed' to exclude non-manageable systems

Main Rule- Set to 'No conditions' for simplicity; let scope/group do the filtering

Sub-rules- Define specific compliance conditions (e.g., patch level, antivirus status)

This structure ensures:

Efficient policy evaluation

Only applicable Windows endpoints are assessed

Manageable systems are prioritized

Specific compliance checks occur in sub-rules

Referenced Documentation:

Define Policy Scope documentation

Windows Update Compliance Template v2

Defining a Policy Main Rule


Question 5

Which field is NOT editable in the User Directory plugin once it is configured?



Answer : B

Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:

According to theForescout User Directory Plugin Configuration Guide and YouTube tutorial for User Directory integration, theServer Name field is NOT editable once the User Directory server is configured. Once a server configuration is saved, the Server Name cannot be changed; it can only be modified by deleting and reconfiguring the server entry.

User Directory Server Configuration Fields:

According to the User Directory plugin configuration documentation:

When initially adding a server, these fields are configured:

Server Name- Identifier for the server (e.g., 'lab', 'production-ad')

Address- IP address or FQDN (e.g., 192.168.1.100)

Port- Connection port (e.g., 389, 636)

Domain- Domain name (e.g., example.com)

Administrator- Account credentials for authentication

Password- Password for the administrator account

Editable Fields After Configuration:

According to the configuration workflow:

After the User Directory server is initially configured, the following fieldsCAN be edited:

Administrator- Can be changed to update authentication credentials

Password- Can be updated if credentials change

Port- Can be modified if the connection port changes

Address- Can be changed to point to a different server

Domain- Can be updated if domain name changes

Non-Editable Field:

According to the User Directory plugin behavior:

TheServer Nameis used as the primary identifier for the User Directory server configuration in Forescout. Once created, this identifier cannot be modified because it:

Serves as the unique identifier in the Forescout database

Is referenced by other configurations and policies

Changing it would break existing policy references

Must be deleted and recreated to change

Verification Workflow:

According to the tutorial documentation:

After creating a User Directory server configuration with:

Server Name: 'lab'

Address: 192.168.1.50

Port: 389

Domain: example.com

Administrator: domain\admin

Password: [configured]

Once saved and applied, the Server Name 'lab' cannot be edited. To change it, you would need to delete the entire configuration and create a new one with a different name.

Why Other Fields Are Editable:

A . Administrator- Editable; credentials may need to be updated

C . Password- Editable; security practice requires periodic password changes

D . Address- Editable; server may move to a different IP

E . Port- Editable; port configuration may change based on security requirements

Referenced Documentation:

Forescout User Directory Plugin - Integration tutorial

Configure server settings documentation

User Directory Plugin Configuration - Initial Setup documentation


Question 6

Which of the following is a switch plugin property that can be used to identify endpoint connection location?



Answer : C

Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:

According to theForescout Switch Plugin Configuration Guide Version 8.12and theSwitch Properties documentation, theSwitch IP/FQDN and Port Nameproperty is used to identify an endpoint's connection location. The documentation explicitly states:

'The Switch IP/FQDN and Port Name property contains either the IP address or the fully qualified domain name of the switch and the port name (the physical connection point on that switch) to which the endpoint is connected.'

Switch IP/FQDN and Port Name Property:

This property is fundamental for identifying where an endpoint is physically connected on the network. According to the documentation:

Purpose:Provides the exact physical location of an endpoint on the network by identifying:

Switch IP Address or FQDN- Which switch the endpoint is connected to

Port Name- Which specific port on that switch the endpoint uses

Example:A property value might look like:

10.10.1.50:Port Fa0/15(IP address and port name)

core-switch.example.com:GigabitEthernet0/1/1(FQDN and port name)

Use Cases for Location Identification:

According to the Switch Plugin Configuration Guide:

Physical Topology Mapping- Administrators can see exactly where each endpoint connects to the network

Port-Based Policies- Create policies that apply actions based on specific switch ports

Troubleshooting- Quickly locate endpoints by their switch port connection

Inventory Tracking- Maintain accurate records of device locations and connections

Switch Location vs. Switch IP/FQDN and Port Name:

According to the documentation:

Property

Purpose

Switch Location

The switch location based on the switch MIB (Management Information Base) - geographic location of the switch itself

Switch IP/FQDN and Port Name

The specific switch and port where an endpoint is connected - physical connection point

Switch Port Alias

The alias/description of the port (if configured on the switch)

The key difference:Switch Locationidentifies where the switch itself is located, whileSwitch IP/FQDN and Port Nameidentifies the specific connection point where the endpoint is attached.

Why Other Options Are Incorrect:

A . Switch Location- Identifies the location of the switch device itself (from MIB), not the endpoint's connection point

B . Switch Port Alias- This is an alternate name for a port (like 'Conference Room Port'), not the connection location information

D . Switch Port Action- This indicates what action was performed on a port, not where the endpoint is located

E . Wireless SSID- This is a Wireless Plugin property, not a Switch Plugin property; identifies wireless network name, not switch connection location

Switch Properties for Endpoint Location:

According to the complete Switch Properties documentation:

The Switch Plugin provides these location-related properties:

Switch IP/FQDN - The switch to which the endpoint connects

Switch IP/FQDN and Port Name- The complete location (switch and port)

Switch Port Name - The specific port on the switch

Switch Port Alias - Alternate port name

OnlySwitch IP/FQDN and Port Nameprovides the complete endpoint connection location information in a single property.

Referenced Documentation:

Forescout CounterACT Switch Plugin Configuration Guide Version 8.12

Switch Properties documentation

Viewing Switch Information in the All Hosts Pane

About the Switch Plugin


Question 7

Which of the following plugins assists in classification for computer endpoints? (Choose two)



Answer : B, D

Comprehensive and Detailed Explanation From Exact Extract of Forescout Platform Administration and Deployment:

According to theForescout Administration Guide and Base Modules documentation, the plugins that assist in classification for computer endpoints areHPS Inspection Engine (B) and Advanced Tools (D).

HPS Inspection Engine Classification:

According to the HPS Inspection Engine Configuration Guide:

'The HPS Inspection Engine powers CounterACT tools used for classifying endpoints. These tools include the classification engine that is part of HPS Inspection Engine, the Primary Classification, Asset Classification and Mobile Classification templates, the Classify actions, and Classification/Classification (Advanced) properties.'

The HPS Inspection Engine provides:

Classification Engine- Determines the Network Function property

Primary Classification Template- Classifies endpoints into categories

Asset Classification Template- For asset-level classification

Mobile Classification Template- For mobile device classification

Multiple Classification Methods- Including NMAP, HTTP banner scanning, SMB analysis, passive TCP/IP fingerprinting

Advanced Tools Plugin Classification:

According to the Advanced Tools Plugin documentation:

'The Advanced Tools Plugin is used to classify endpoints based on characteristics such as operating system, hardware vendor, and application software.'

The Advanced Tools Plugin provides:

Endpoint Classification- Based on OS, vendor, and applications

Device Property Resolution- Resolves device characteristics

Fingerprinting- Identifies endpoints based on behavioral patterns

Why Other Options Are Incorrect:

A . Switch- The Switch Plugin manages network devices (switches) and provides VLAN/access control, not endpoint classification

C . Linux Plugin- The Linux Plugin is a platform-specific module for managing Linux endpoints, not a general classification tool

E . DNS Client- The DNS Client Plugin resolves DNS queries but does not assist with endpoint classification

Classification Workflow:

According to the documentation:

When classifying computer endpoints, Forescout uses:

HPS Inspection Engine- Primary classification tool analyzing:

HTTP banners from web services

SMB protocol information

NMAP scans and service detection

Passive TCP/IP fingerprinting

Domain credentials analysis

Advanced Tools Plugin- Secondary classification providing:

Application detection

Operating system identification

Hardware characteristics

Together, these plugins provide comprehensive endpoint classification for computer systems.

Classification Properties Resolved:

According to the Base Modules documentation:

The HPS Inspection Engine and Advanced Tools plugins resolve:

Function (Workstation, Printer, Server, Router, etc.)

Operating System (Windows, Linux, macOS, etc.)

Network Function (specific device role)

Application information

Referenced Documentation:

CounterACT Endpoint Module HPS Inspection Engine Configuration Guide v10.8

Forescout Platform Base Modules

About the Forescout Advanced Tools Plugin


Page:    1 / 14   
Total 80 questions