Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

Fortinet NSE6_FNC-8.5 Exam Actual Questions

The questions for NSE6_FNC-8.5 were last updated on April 13, 2024.
  • Viewing page 1 out of 8 pages.
  • Viewing questions 1-4 out of 30 questions

Topic 1 - Single Topic

Question #1 Topic 1

Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)

  • A. SNMP
  • B. RADIUS
  • C. FTP
  • D. CLI
  • E. SMTP
Reveal Solution Hide Solution   Discussion   7

Correct Answer: ABC 🗳️
Set up SNMP communication with FortiNAC
RADIUS Server that is used by FortiNAC to communicate
FortiNAC can be configured via CLI to use HTTP or HTTPS for OS updates instead of FTP.
Reference:
https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/28966/snmp https://docs.fortinet.com/document/fortinac/8.8.0/administration-guide/938271/configure-radius-settings https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/e7ebbdaa-cabf-11ea-8b7d-00505692583a/FortiNAC_Deployment_Guide.pdf

Question #2 Topic 1

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)

  • A. A matched security policy
  • B. Scheduled poll timings
  • C. Linkup and Linkdown traps
  • D. Manual polling
  • E. A failed Layer 3 poll
Reveal Solution Hide Solution   Discussion   2

Correct Answer: BCD 🗳️

Question #3 Topic 1

How should you configure MAC notification traps on a supported switch?

  • A. Configure them only on ports set as 802.1q trunks
  • B. Configure them on all ports except uplink ports
  • C. Configure them on all ports on the switch
  • D. Configure them only after you configure linkup and linkdown traps
Reveal Solution Hide Solution   Discussion   1

Correct Answer: B 🗳️
Configure SNMP MAC Notification traps on all access ports (do not include uplinks).
Reference:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/be7fcde9-9685-11e9-81a4-00505692583a/
Configuring_Traps_for_MAC_Notification.pdf

Question #4 Topic 1

Which connecting endpoints are evaluated against all enabled device profiling rules?

  • A. Known trusted devices each time they change location
  • B. Rogues devices, each time they connect
  • C. Rogues devices, only when they connect for the first time
  • D. All hosts, each time they connect
Reveal Solution Hide Solution   Discussion   6

Correct Answer: A 🗳️
FortiNAC process to classify rogue devices and create an organized inventory of known trusted registered devices.
Reference:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/9529d49c-892c-11e9-81a4-00505692583a/
FortiNAC_Device_Profiler_Configuration.pdf

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...