Monday, July 5, 2021, 7:54 AM Finished Monday, July 5, 2021, 8:08 AM 14 mins 53 secs
Points
6/10
Grade
60 out of 100
Feedback I'm sorry, you did not pass.
Question
1
With respect to FortiNAC buyer personas, which statement would resonate the most with a CISO?
Correct 1 points out of 1
Select one: There is a low entry-cost to see the value of the solution. Multiple-vendor support means low network impact. Use zero trust to protect the network from IoT devices. There is low network impact due to centralized architecture.
Question
2
How does FortiNAC dynamically control access to the network?
Incorrect 0 points out of 1
Select one: Detects a change of behavior based on the device profile and quarantines the device. Blocks traffic on ports that it suspects are targeted by a DDoS attack. Redirects network traffic to realize greater efficiency. Quarantines and verifies suspected malicious applications within a self-contained virtual environment.
Question
3
What are two steps FortiNAC performs in the process of identifying a device on the network? (Choose two.)
Correct 1 points out of 1
Select one or more: After a device connects to a switch, FortiNAC communicates with the switch to obtain the device’s MAC address. FortiNAC moves the application running on the device to an isolated environment for analysis until the device can be identified. FortiNAC communicates with FortiGuard Labs to obtain the latest antivirus signatures. FortiNAC identifies the TCP port numbers the device is using to determine if they are expected for that type of device.
Question
4
Which two key capabilities does FortiNAC offer customers? (Choose two.)
Correct 1 points out of 1
Select one or more: Filtration—FortiNAC Filtration—Fo rtiNAC filters web traffic and stops any known malware Segmentation—FortiNAC Segmentation—Fo rtiNAC segments the network by device so that the device can only access those assets it requires Malware containment and analysis—FortiNAC analysis—FortiNAC an application to an isolated environment to analyze it for potential potential Visibility—FortiNAC Visibility—Fo rtiNAC provides identification, profiling, and vulnerability scanning of devices
Select one: Once a user or device is granted access to a network resource, for continued access there is zero re-evaluation of the user’s or device’s attributes. Users and devices can request access to a resource only one time, and if they are denied, any additional attempts to access the resource are denied Every time a user or device requests network access to a resource, the device and user must first be verified before any access is given. Once a user or device is granted access to a network resource, the user or device gains access to all network resources.
Question
6
What are two key platform differentiators for FortiNAC? (Choose two.)
Incorrect 0 points out of 1
Select one or more: Its centralized architecture simplifies deployment It requires NAC boxes at various locations in the network to sniff traffic to ensure there is no single point of failure. It supports more than 2500 network infrastructure devices Its NIC accelerators ensure greater network throughput
Question
7
What feature supports the claim that FortiNAC is highly scalable? (Choose two.)
Incorrect 0 points out of 1
Select one: FortiNAC can be deployed as a VM in the public cloud. FortiNAC can receive information through port mirroring across the network. FortiNAC sensors allow for growth. FortiNac does not require viewing network traffic, thus eliminating the need to deploy an appliance on every site.
Question
8
Given the prevalence of IoT and BYO BYOD D devices on networks, what is one question that is difficult for IT to answer without NAC?
Correct 1 points out of 1
Select one: What devices are on your network? How many emails are sent and received daily from your email server? What ports and IPs have been blocked on your network? How many DDoS attacks have you experienced in the last six months?
Question
9
What is a key capability of FortiNAC?
Correct 1 points out of 1
Select one: FortiNAC monitors the network continuously and responds automatically when a triggering event is observed. FortiNAC segments the network according to subnet mask and IP address. FortiNAC protects the network from a distributed denial of service attack by blocking traffic that surpasses prescribed thresholds. FortiNAC authenticates all devices and users before they can access the network.
Thank you for interesting in our services. We are a non-profit group that run this website to share documents. We need your help to maintenance this website.