An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?
Answer : C
To generate an alarm from a Host At Risk event, an administrative user must create an Event to Alarm Mapping for the Vulnerability Scan Failed event. Within this alarm mapping, a host security action must be designated to mark the host at risk
How does FortiGate update FortiNAC about VPN session information?
Answer : B
Which three capabilities does FortiNAC Control Manager provide? (Choose three.)
Answer : A, D, E
Which two of the following are required for endpoint compliance monitors? (Choose two.)
Answer : A, D
DirectDefense's analysis of FireEye Endpoint attests that the products help meet the HIPAA Security Rule.
In the menu on the left click the + sign next to Endpoint Compliance to open it.
https://docs.fortinet.com/document/fortinac/7.2.2/administration-guide/92047/add-or-modify-a-scan
Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
Answer : A, C
To gather a list of installed applications and application details from a host, two methods can be used:
Agent technology: FortiNAC uses agent technology to collect all installed applications on an endpoint.
Integration with MDMs (Mobile Device Management systems): MDMs that support application gathering can be integrated with FortiNAC to collect application information.
Reference
FortiNAC 7.2 Study Guide, page 302
Where do you look to determine when and why the FortiNAC made an automated network access change?
Answer : B
Study Guide p. 356: Any time FortiNAC changes network access for an endpoint, the change is documented on the Port Changes view. This provides an administrator with valuable information when validating control configurations and enforcement.
Where should you configure MAC notification traps on a supported switch?
Answer : C
In general, for network switches supporting MAC notification traps, it's advisable to configure these traps on all ports except uplink ports. Uplink ports are used for connecting to other switches or network infrastructure devices and typically don't need MAC notification traps, which are more relevant for end-device connectivity monitoring.
The study guide specifies that MAC notification traps should not be configured on interfaces that are uplinks. They are the preferred method for learning and updating Layer 2 information and should be used whenever available, but not on uplink interfaces.