Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

7/5/2021 FortiNAC Quiz: Attempt review

 NSE 3 FortiNAC

Started on Monday, July 5, 2021, 7:54 AM


State Finished
Completed on Monday, July 5, 2021, 8:08 AM
Time taken 14 mins 53 secs
Points 6/10
Grade 60 out of 100
Feedback I'm sorry, you did not pass.

Question 1 With respect to FortiNAC buyer personas, which statement would resonate the most with a CISO?
Correct

1 points out of 1 Select one:


There is a low entry-cost to see the value of the solution.

Multiple-vendor support means low network impact.

Use zero trust to protect the network from IoT devices. 

There is low network impact due to centralized architecture.

Question 2 How does FortiNAC dynamically control access to the network?


Incorrect

0 points out of 1 Select one:


Detects a change of behavior based on the device profile and quarantines the device.

Blocks traffic on ports that it suspects are targeted by a DDoS attack.

Redirects network traffic to realize greater efficiency.

Quarantines and verifies suspected malicious applications within a self-contained virtual environment. 

Question 3 What are two steps FortiNAC performs in the process of identifying a device on the network? (Choose two.)
Correct

1 points out of 1 Select one or more:


After a device connects to a switch, FortiNAC communicates with the switch to obtain the device’s MAC address. 

FortiNAC moves the application running on the device to an isolated environment for analysis until the device can be
identified.

FortiNAC communicates with FortiGuard Labs to obtain the latest antivirus signatures.

FortiNAC identifies the TCP port numbers the device is using to determine if they are expected for that type of device. 

Question 4 Which two key capabilities does FortiNAC offer customers? (Choose two.)
Correct

1 points out of 1 Select one or more:


Filtration—FortiNAC filters web traffic and stops any known malware

Segmentation—FortiNAC segments the network by device so that the device can only access those assets it requires 

Malware containment and analysis—FortiNAC  an application to an isolated environment to analyze it for potential

Visibility—FortiNAC provides identification, profiling, and vulnerability scanning of devices 

https://training.fortinet.com/mod/quiz/review.php?attempt=7542432&cmid=126496 1/3
7/5/2021 FortiNAC Quiz: Attempt review

Question 5 Which statement describes zero trust?


Incorrect

0 points out of 1 Select one:


Once a user or device is granted access to a network resource, for continued access there is zero re-evaluation of the user’s or
device’s attributes.

Users and devices can request access to a resource only one time, and if they are denied, any additional attempts to access
the resource are denied 

Every time a user or device requests network access to a resource, the device and user must first be verified before any access
is given.

Once a user or device is granted access to a network resource, the user or device gains access to all network resources.

Question 6 What are two key platform differentiators for FortiNAC? (Choose two.)
Incorrect

0 points out of 1 Select one or more:


Its centralized architecture simplifies deployment

It requires NAC boxes at various locations in the network to sniff traffic to ensure there is no single point of failure. 

It supports more than 2500 network infrastructure devices 

Its NIC accelerators ensure greater network throughput

Question 7 What feature supports the claim that FortiNAC is highly scalable? (Choose two.)
Incorrect

0 points out of 1 Select one:


FortiNAC can be deployed as a VM in the public cloud. 

FortiNAC can receive information through port mirroring across the network.

FortiNAC sensors allow for growth.

FortiNac does not require viewing network traffic, thus eliminating the need to deploy an appliance on every site.

Question 8 Given the prevalence of IoT and BYOD devices on networks, what is one question that is difficult for IT to answer without NAC?
Correct

1 points out of 1 Select one:


What devices are on your network? 

How many emails are sent and received daily from your email server?

What ports and IPs have been blocked on your network?

How many DDoS attacks have you experienced in the last six months?

Question 9 What is a key capability of FortiNAC?


Correct

1 points out of 1 Select one:


FortiNAC monitors the network continuously and responds automatically when a triggering event is observed. 

FortiNAC segments the network according to subnet mask and IP address.

FortiNAC protects the network from a distributed denial of service attack by blocking traffic that surpasses prescribed
thresholds.

FortiNAC authenticates all devices and users before they can access the network.

https://training.fortinet.com/mod/quiz/review.php?attempt=7542432&cmid=126496 2/3
7/5/2021 FortiNAC Quiz: Attempt review

Question 10 Which three Fortinet products can be integrated with FortiNAC as part of the Fortinet Security Fabric? (Choose three.)
Correct

1 points out of 1 Select one or more:


FortiPhone

FortiSIEM 

FortiClient 

FortiGate 

FortiToken

https://training.fortinet.com/mod/quiz/review.php?attempt=7542432&cmid=126496 3/3

You might also like