Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Fortinet > Fortinet Certifications > NSE6_FNC-8.5 > NSE6_FNC-8.5 Online Practice Questions and Answers

NSE6_FNC-8.5 Online Practice Questions and Answers

Questions 4

Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)

A. SNMP

B. RADIUS

C. FTP

D. CLI

E. SMTP

Buy Now

Correct Answer: ABC

Set up SNMP communication with FortiNAC RADIUS Server that is used by FortiNAC to communicate FortiNAC can be configured via CLI to use HTTP or HTTPS for OS updates instead of FTP.

Reference: https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/28966/snmp https://docs.fortinet.com/document/fortinac/8.8.0/administration-guide/938271/configure-radius-settings https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/e7ebbdaa-cabf-11ea-8b7d00505692583a/FortiNAC_Deployment_Guide.pdf

Questions 5

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)

A. A matched security policy

B. Scheduled poll timings

C. Linkup and Linkdown traps

D. Manual polling

E. A failed Layer 3 poll

Buy Now

Correct Answer: BCD

Questions 6

In a wireless integration, how does FortiNAC obtain connecting MAC address information?

A. Link traps

B. End station traffic monitoring

C. MAC notification traps

D. RADIUS

Buy Now

Correct Answer: D

Intelligent Access Points (IAPs) and controllers support two methods of RADIUS based authentication: RADIUS MAC authentication and 802.1x authentication.

Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/9019f7f8-200d-11e9b6f6-f8bc1258b856/FortiNAC_Wireless_Integration_Overview.pdf

Questions 7

Which system group will force at-risk hosts into the quarantine network, based on point of connection?

A. Forced Quarantine

B. Forced Remediation

C. Forced Isolation

D. Physical Address Filtering

Buy Now

Correct Answer: B

A remediation plan is established, including a forensic analysis and a reload of the system. Also, users are forced to change their passwords as the system held local user accounts.

Reference: https://oit.rice.edu/quarantining-process-used-it-staff-members-introduction

Questions 8

Which agent is used only as part of a login script?

A. Persistent

B. Passive

C. Mobile

D. Dissolvable

Buy Now

Correct Answer: A

If the logon script runs the logon application in persistent mode, configure your Active Directory server not to run scripts synchronously.

Reference: https://www.websense.com/content/support/library/deployctr/v76/ init_setup_creating_and_running_logon_agent_script_deployment_tasks.aspx

Questions 9

Which command line shell and scripting language does FortiNAC use for WinRM?

A. Powershell

B. Bash

C. Linux

D. DOS

Buy Now

Correct Answer: A

Open Windows PowerShell or a command prompt. Run the following command to determine if you already have WinRM over HTTPS configured.

Reference: https://docs.fortinet.com/document/fortinac/8.7.0/administration-guide/246310/winrm-deviceprofile-requirements-and-setup

Questions 10

When you create a user or host profile; which three criteria can you use? (Choose three.)

A. An applied access policy

B. Administrative group membership

C. Location

D. Host or user group memberships

E. Host or user attributes

Buy Now

Correct Answer: ACE

Reference: https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/15797/user-host-profiles

Questions 11

What causes a host's state to change to "at risk"?

A. The host has been administratively disabled.

B. The logged on user is not found in the Active Directory.

C. The host has failed an endpoint compliance policy or admin scan.

D. The host is not in the Registered Hosts group.

Buy Now

Correct Answer: C

Failure ?Indicates that the host has failed the scan. This option can also be set manually. When the status is set to Failure the host is marked";At Ris"; for the selected scan.

Reference: https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/241168/host-health-andscanning

Questions 12

Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)

A. Agent technology

B. MDM integration

C. Portal page on-boarding options

D. Application layer traffic inspection

Buy Now

Correct Answer: BC

Reference: https://developer.apple.com/business/documentation/MDM-Protocol-Reference.pdf https://docs.oracle.com/en/middleware/idm/identity-governance/12.2.1.3/omusg/managing-applicationonboarding.html#GUID-4D0D5B18-A6F5-4231-852E-DB0D95AAE2D1

Questions 13

Which agent can receive and display messages from FortiNAC to the end user?

A. Persistent

B. Passive

C. MDM

D. Dissolvable

Buy Now

Correct Answer: B

Reference: https://docs.fortinet.com/document/fortinac/8.7.0/administration-guide/594507/agent-packages

Exam Code: NSE6_FNC-8.5
Exam Name: Fortinet NSE 6 - FortiNAC 8.5
Last Update: Jun 13, 2025
Questions: 30

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.