With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
Answer : C
https://training.fortinet.com/pluginfile.php/1912463/mod_resource/content/26/FortiNAC_7.2_Study_Guide-Online.pdf C. Page 327 - moved to the quarantine isolation network
What capability do logical networks provide?
Answer : C
Logical Networks allow you to create fewer Network Access Policies than before. (FortiNAC - What's new in FortiNAC 8.5)
When you create a user or host profile; which three criteria can you use? (Choose three.)
Answer : C, D, E
Fortinac-admin-operations, P. 391
Where do you look to determine which network access policy, if any is being applied to a particular host?
Answer : A
FortiNAC p 382: 'Under Network Access Settings - Policy Name - Name of the Network Access Policy that currently applies to the host.'
While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.
Where would the administrator look to determine when and why FortiNAC made the network access change?
Answer : C
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
Answer : B
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
Answer : A, B, E