Professional Documents
Culture Documents
FortiNAC Quiz - Attempt Review
FortiNAC Quiz - Attempt Review
NSE 3 FortiNAC
Question 1 With respect to FortiNAC buyer personas, which statement would resonate the most with a CISO?
Correct
Quarantines and verifies suspected malicious applications within a self-contained virtual environment.
Question 3 What are two steps FortiNAC performs in the process of identifying a device on the network? (Choose two.)
Correct
FortiNAC moves the application running on the device to an isolated environment for analysis until the device can be
identified.
FortiNAC communicates with FortiGuard Labs to obtain the latest antivirus signatures.
FortiNAC identifies the TCP port numbers the device is using to determine if they are expected for that type of device.
Question 4 Which two key capabilities does FortiNAC offer customers? (Choose two.)
Correct
Segmentation—FortiNAC segments the network by device so that the device can only access those assets it requires
Malware containment and analysis—FortiNAC an application to an isolated environment to analyze it for potential
https://training.fortinet.com/mod/quiz/review.php?attempt=7542432&cmid=126496 1/3
7/5/2021 FortiNAC Quiz: Attempt review
Users and devices can request access to a resource only one time, and if they are denied, any additional attempts to access
the resource are denied
Every time a user or device requests network access to a resource, the device and user must first be verified before any access
is given.
Once a user or device is granted access to a network resource, the user or device gains access to all network resources.
Question 6 What are two key platform differentiators for FortiNAC? (Choose two.)
Incorrect
It requires NAC boxes at various locations in the network to sniff traffic to ensure there is no single point of failure.
Question 7 What feature supports the claim that FortiNAC is highly scalable? (Choose two.)
Incorrect
FortiNAC can receive information through port mirroring across the network.
FortiNac does not require viewing network traffic, thus eliminating the need to deploy an appliance on every site.
Question 8 Given the prevalence of IoT and BYOD devices on networks, what is one question that is difficult for IT to answer without NAC?
Correct
How many emails are sent and received daily from your email server?
How many DDoS attacks have you experienced in the last six months?
FortiNAC protects the network from a distributed denial of service attack by blocking traffic that surpasses prescribed
thresholds.
FortiNAC authenticates all devices and users before they can access the network.
https://training.fortinet.com/mod/quiz/review.php?attempt=7542432&cmid=126496 2/3
7/5/2021 FortiNAC Quiz: Attempt review
Question 10 Which three Fortinet products can be integrated with FortiNAC as part of the Fortinet Security Fabric? (Choose three.)
Correct
FortiSIEM
FortiClient
FortiGate
FortiToken
https://training.fortinet.com/mod/quiz/review.php?attempt=7542432&cmid=126496 3/3