Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)
Answer : A, B
Network Access policies as a common type of policy in FortiNAC, used to dynamically provision access to connecting endpoints. While Authentication is typically a policy type in network access control systems like FortiNAC
Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)
Answer : A, C, E
FortiNAC Study Guide 7.2 | Page 11
FortiNAC uses various methods to communicate with infrastructure devices such as SNMP for discovery and ongoing management, SSH or Telnet through the CLI for tasks related to the infrastructure, and RADIUS for handling specific types of requests
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?
Answer : C
When a rogue device connects to a port in the Forced Registration port group, FortiNAC's response is to isolate that device by moving it to a registration captive network. This is part of FortiNAC's state-based control mechanism, where the system acts based on the state of the device (normal, rogue, etc.) and the group or port it is connected to. In this specific scenario, the focus is on the isolation of the rogue device, and the guide does not explicitly detail the simultaneous handling of the normal device.
Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
Answer : A, C
To gather a list of installed applications and application details from a host, two methods can be used:
Agent technology: FortiNAC uses agent technology to collect all installed applications on an endpoint.
Integration with MDMs (Mobile Device Management systems): MDMs that support application gathering can be integrated with FortiNAC to collect application information.
Reference
FortiNAC 7.2 Study Guide, page 302
Where do you look to determine which network access policy, if any is being applied to a particular host?
Answer : A
To determine which network access policy is applied to a particular host, you should look at the Policy Details window. This window provides information about the types of policies applied (such as Network Access, Authentication, Supplicant, etc.), including the profile name, policy name, configuration name, and any settings that make up the configuration.
FortiNAC p 382: 'Under Network Access Settings - Policy Name - Name of the Network Access Policy that currently applies to the host.'
View the command and output shown in the exhibit.
What is the current state of this host?
Answer : A
The exhibit's command and output detail various attributes for a specific host, including the MAC address, connection status, and various other parameters. The status 'Connected' and state 'Initial' indicate that the host has been detected on the network but has not yet completed any authentication process. The lines 'Client Not Authenticated = true' and 'Client needs to authenticate = false' suggest that the host has not yet been authenticated. Therefore, the current state of the host is 'Not authenticated,' since there is a clear indication that the authentication process has not been completed for this host.
In an isolation VLAN which three services does FortiNAC supply? (Choose three.)
Answer : B, C, D
In an isolation VLAN, FortiNAC supplies DHCP and DNS services. The guide specifies that FortiNAC has a DHCP scope defined for a particular VLAN and should be the only DHCP server available to hosts on that VLAN. Additionally, hosts on the VLAN would get a DNS server configuration of the FortiNAC IP for that VLAN