With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
Answer : C
https://training.fortinet.com/pluginfile.php/1912463/mod_resource/content/26/FortiNAC_7.2_Study_Guide-Online.pdf C. Page 327 - moved to the quarantine isolation network
Where should you configure MAC notification traps on a supported switch?
Answer : D
How are logical networks assigned to endpoints?
Answer : B
Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)
Answer : B, D
Which agent is used only as part of a login script?
Answer : B
If the logon script runs the logon application in persistent mode, configure your Active Directory server not to run scripts synchronously.
Where do you look to determine when and why the FortiNAC made an automated network access change?
Answer : B
Study Guide p. 356: Any time FortiNAC changes network access for an endpoint, the change is documented on the Port Changes view. This provides an administrator with valuable information when validating control configurations and enforcement.
When you create a user or host profile; which three criteria can you use? (Choose three.)
Answer : C, D, E
Fortinac-admin-operations, P. 391