New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Network Security Expert > FCP_FCT_AD-7.4

FCP_FCT_AD-7.4 Fortinet NSE 6 - FortiClient EMS 7.4 Administrator Question and Answers

Question # 4

Which two statements about ZTNA destinations are true? (Choose two.)

A.

FottiClient ZTNA destinations use an existing VPN tunnel to create a secure connection.

B.

FortiClient ZTNA destinations provides access through TCP forwarding.

C.

FortiClient ZTNA destinations do not support a wildcard FQDN.

D.

FortiClient ZTNA destination encryption is disabled by default.

E.

FortiCIient ZTNA destination authentication is enabled by default.

Full Access
Question # 5

Refer to the exhibit, which shows the output of the ZTNA traffic log on FortiGate.

What can you conclude from the log message?

A.

The remote user connection does not match the local-in policy.

B.

The remote user connection does not match the ZTNA rule configuration.

C.

The remote user connection does not match the ZTNA server configuration.

D.

The remote user connection does not match the ZTNA firewall policy.

Full Access
Question # 6

An administrator wants to simplify remote access without asking users to provide user credentials Which access control method provides this solution?

A.

ZTNA full mode

B.

SSL VPN

C.

L2TP

D.

ZTNA IP/MAC littering mode

Full Access
Question # 7

An administrator installs FortiClient on Windows Server.

What is the default behavior of real-time protection control?

A.

Real-time protection must update AV signature database

B.

Real-time protection sends malicious files to FortiSandbox when the file is not detected locally

C.

Real-time protection is disabled

D.

Real-time protection must update the signature database from FortiSandbox

Full Access
Question # 8

An administrator is required to maintain a software vulnerability on the endpoints, without showing the feature on the FortiClient. What must the administrator do to achieve this requirement?

A.

Select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile

B.

Disable select the vulnerability scan feature in the deployment package

C.

Click the hide icon on the vulnerability scan profile assigned to endpoint

D.

Use the default endpoint profile

Full Access
Question # 9

Which security fabric component sends a notification io quarantine an endpoint after IOC detection "n the automation process?

A.

FortiAnalyzer

B.

FortiGate

C.

FortiClient EMS

D.

FortiClient

Full Access
Question # 10

Which statement about the FortiClient enterprise management server is true?

A.

It receives the configuration information of endpoints from ForuGate.

B.

It provides centralized management of multiple endpoints running FortiClient software.

C.

It enforces compliance on the endpoints using tags

D.

It receives the CA certificate from FortiGate to validate client certrficates.

Full Access
Question # 11

Refer to the exhibit.

Based on the CLI output from FortiGate. which statement is true?

A.

FortiGate is configured to pull user groups from FortiClient EMS

B.

FortiGate is configured with local user group

C.

FortiGate is configured to pull user groups from FortiAuthenticator

D.

FortiGate is configured to pull user groups from AD Server.

Full Access
Question # 12

Exhibit.

Based on the logs shown in the exhibit, why did FortiClient EMS tail to install FortiClient on the endpoint?

A.

The FortiClient antivirus service is not running.

B.

The Windows installer service is not running.

C.

The remote registry service is not running.

D.

The task scheduler service is not running.

Full Access
Question # 13

A company must integrate the FortiClient EMS with their existing identity management infrastructure for user authentication, and implement and enforce administrative access with multi-factor authentication (MFA). Which two authentication methods can they use in this scenario? (Choose two answers)

A.

LDAPS

B.

RADIUS

C.

TACACS

D.

SAML

Full Access
Question # 14

Which security attribute is verified during the SSL connection negotiation between FortiClient and FortiClient EMS to mitigate man-in-the-middle (MITM) attacks? (Choose one answer)

A.

serial number (SN)

B.

common name (CN)

C.

location (L)

D.

organization (O)

Full Access
Question # 15

Refer to the exhibit, which shows FortiClient EMS deployment, profiles.

When an administrator creates a deployment profile on FortiClient EMS. which statement about the deployment profile is true?

A.

Deployment-2 will upgrade FortiClient on both the AD group and workgroup.

B.

Deployment-1 will install FortiClient on new AO group endpoints.

C.

Deployment-2 will install FortiClient on both the AD group and workgroup.

D.

Deployment-1 will upgrade FortiClient only on the workgroup.

Full Access
Question # 16

Refer to the exhibit, which shows the endpoint summary information on FortiClient EMS.

What two conclusions can you make based on the Remote-Client status shown above? (Choose two.)

A.

The endpoint is classified as at risk.

B.

The endpoint has been assigned the Default endpoint policy.

C.

The endpoint is configured to support FortiSandbox.

D.

The endpoint is currently off-net.

Full Access
Question # 17

A FortiClient EMS administrator is implementing additional security on FortiClient for compliance checks. Which tags can the administrator configure to detect endpoints based on vulnerability severity levels? (Choose one answer)

A.

Outbreak alert tags

B.

Classification tags

C.

Fabric tags

D.

Security posture tags

Full Access
Question # 18

Refer to the exhibit.

Based on the FortiClient logs shown in the exhibit which application is blocked by the application firewall?

A.

Twitter

B.

Facebook

C.

Internet Explorer

D.

Firefox

Full Access
Question # 19

Which three types of antivirus scans are available on FortiClient? (Choose three )

A.

Proxy scan

B.

Full scan

C.

Custom scan

D.

Flow scan

E.

Quick scan

Full Access
Question # 20

Which two are benefits of using multi-tenancy mode on FortiClient EMS? (Choose two.)

A.

Separate host servers manage each site.

B.

Licenses are shared among sites

C.

The fabric connector must use an IP address to connect to FortiClient EMS.

D.

It provides granular access and segmentation.

Full Access