Professional Documents
Culture Documents
FortiNAC Quiz - Attempt Review 2
FortiNAC Quiz - Attempt Review 2
NSE 3 FortiNAC
Question 1 Which three Fortinet products can be integrated with FortiNAC as part of the Fortinet Security Fabric? (Choose three.)
Correct
FortiClient
FortiToken
FortiSIEM
FortiPhone
Question 2 Which three pain points have contributed to the exponential growth of NAC? (Choose three.)
Correct
The proliferation of the Internet of Things (IoT) and wanting to apply zero trust principles to these devices
Network administrators lack the visibility to identify and monitor all of the devices on the network
SQL injection, an increasingly popular technique, exploits a security vulnerability in an application’s software
For regulatory compliance, CISOs need proof that the enterprise is controlling and monitoring its network
Question 3 Given the prevalence of IoT and BYOD devices on networks, what is one question that is difficult for IT to answer without NAC?
Correct
How many DDoS attacks have you experienced in the last six months?
How many emails are sent and received daily from your email server?
Every time a user or device requests network access to a resource, the device and user must first be verified before any access is
given.
Once a user or device is granted access to a network resource, for continued access there is zero re-evaluation of the user’s or
device’s attributes.
Once a user or device is granted access to a network resource, the user or device gains access to all network resources.
https://training.fortinet.com/mod/quiz/review.php?attempt=7542586&cmid=126496 1/3
7/5/2021 FortiNAC Quiz: Attempt review
FortiNAC authenticates all devices and users before they can access the network.
FortiNAC protects the network from a distributed denial of service attack by blocking traffic that surpasses prescribed
thresholds.
“Do you intend to have user identity information shared across your network?”
“Do you want to deploy a Zero Trust approach to the devices on the network??”
Question 7 What is a correct response for a prospect asking “We are not a Fortinet customer, would FortiNAC work in my network?”?
Correct
“Yes, but you would have to replace the majority of your devices with Fortinet devices.”
“Yes, FortiNAC supports more than 170 vendors and excels in multi-vendor environments.”
Question 8 What are two steps FortiNAC performs in the process of identifying a device on the network? (Choose two.)
Correct
After a device connects to a switch, FortiNAC communicates with the switch to obtain the device’s MAC address.
FortiNAC identifies the TCP port numbers the device is using to determine if they are expected for that type of device.
FortiNAC moves the application running on the device to an isolated environment for analysis until the device can be identified.
Question 9 Which two key capabilities does FortiNAC offer customers? (Choose two.)
Correct
Segmentation—FortiNAC segments the network by device so that the device can only access those assets it requires
Malware containment and analysis—FortiNAC an application to an isolated environment to analyze it for potential
Question 10 Which two statements are true about target verticals and industries for FortiNAC? (Choose two.)
Correct
For the most part only small businesses are interested in NAC.
Gi h i fI Td
https://training.fortinet.com/mod/quiz/review.php?attempt=7542586&cmid=126496
i i k d F iNAC i li bl ll i l 2/3
7/5/2021 FortiNAC Quiz: Attempt review
Given the pervasiveness of IoT devices in networks today, FortiNAC is applicable to all verticals.
As governments do not permit BYOD devices on their networks, this vertical has been slow to adopt NAC.
https://training.fortinet.com/mod/quiz/review.php?attempt=7542586&cmid=126496 3/3