Which group type can have members added directly from the FortiNAC Control Manager?
During an evaluation of state-based enforcement, an administrator discovers that ports that should not be under enforcement have been added to enforcement groups. In which view would the administrator be able to determine who added the ports to the groups?
When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)
Two FortiNAC devices have been configured in an HA configuration. After five failed heartbeats between the primary device and secondary device, the primary device fail to ping the designated gateway. What happens next?
Where do you look to determine which network access policy, if any is being applied to a particular host?
What method of communication does FortiNAC use to control VPN host access on FortiGate?
Which connecting endpoints are evaluated against all enabled device profiling rules?