Where do you look to determine which network access policy, if any is being applied to a particular host?
Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
Which group type can have members added directly from the FortiNAC Control Manager?
Which two of the following are required for endpoint compliance monitors? (Choose two.)
Which three of the following are components of a security rule? (Choose three.)
When configuring isolation networks in the configuration wizard, why does a Layer 3 network type allow for more than one DHCP scope for each isolation network type?
When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?