Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Forescout > Forescout Certified Professional > FSCP

FSCP Forescout Certified Professional Exam Question and Answers

Question # 4

Which field is NOT editable in the User Directory plugin once it is configured?

A.

Administrator

B.

Server Name

C.

Password

D.

Address

E.

Port

Full Access
Question # 5

Which of the following switch actions cannot both be used concurrently on the same switch?

A.

Access Port ACL & Switch Block

B.

Switch Block & Assign to VLAN

C.

Endpoint Address ACL & Assign to VLAN

D.

Access Port ACL & Endpoint Address ACL

E.

Access Port ACL & Assign to VLAN

Full Access
Question # 6

Which of the following is a switch plugin property that can be used to identify endpoint connection location?

A.

Switch Location

B.

Switch Port Alias

C.

Switch IP/FQDN and Port Name

D.

Switch Port Action

E.

Wireless SSID

Full Access
Question # 7

Which of the following statements is true regarding Layer-2 channel?

A.

Recommended when there are a large number of VLANs

B.

Response interface is a VLAN trunk

C.

Monitor interface is a trunk

D.

Utilizes two interfaces

E.

Appliance monitor interface must be connected to an access layer switch

Full Access
Question # 8

What Protocol does CounterACT use to verify the revocation status of certificates?

A.

PKI Certificate Revocation Protocol (PCRP)

B.

Online Certificate Status Protocol (OCSP)

C.

Online Revocation Status Protocol (ORSP)

D.

Certificate Revocation List Protocol (CRLP)

E.

Certificate Revocation Protocol (CRP)

Full Access
Question # 9

Which of the following logs are available from the GUI?

A.

Host Details, Policy, Blocking, Event Viewer, Audit Trail

B.

Switch, Policy, Blocking, Event Viewer, Audit Trail

C.

Switch, Discovery, Threat Protection, Event Viewer, Audit Trail

D.

HPS, Policy, Threat Protection, Event Viewer, Audit Trail

E.

Host Details, Policy, Today Log, Threat Event Viewer, Audit Trail

Full Access
Question # 10

Which of the following is true regarding Failover Clustering module configuration?

A.

Once appliances are configured, then press the Apply button.

B.

Segments should be assigned to appliance folders and NOT to the individual appliances.

C.

You can see the status of failover by selecting IP Assignments and failover tab.

D.

Configure the second HA on the Secondary node.

E.

Place only the EM to participate in failover in the folder.

Full Access
Question # 11

When using the discover properties OS, Function, Network Function and NIC Vendor and Module, certain hosts may not be correctly profiled. What else may be used to provide additional possible details to assist in correctly profiling the host?

A.

Monitoring traffic

B.

Packet engine

C.

Advanced Classification

D.

NMAP Scanning

E.

Function

Full Access
Question # 12

Which CLI command gathers historical statistics from the appliance and outputs the information to a single *.csv file for processing and analysis?

A.

fstool tech-support

B.

fstool appstats

C.

fstool va stats

D.

fstool stats

E.

fstool sysinfo stats

Full Access
Question # 13

When creating a new "Send Mail" notification action, which email is used by default?

A.

The email configured under Options > General > Mail

B.

The email address of the last logged in user

C.

The Tech Support email

D.

The email that was used when registering the license

E.

The email entered in the send mail action on the rule

Full Access
Question # 14

Which of the following best describes the 4th step of the basic troubleshooting approach?

A.

Gather Information from the command line

B.

Network Dependencies

C.

Consider CounterACT Dependencies

D.

Form Hypothesis, Document and Diagnose

E.

Gather Information from CounterACT

Full Access
Question # 15

Why would the patch delivery optimization mechanism used for Windows 10 updates be a potential security concern?

A.

It can be configured to use a peer-to-peer file sharing protocol

B.

CounterACT cannot initiate Windows updates for Windows 10 devices

C.

It uses a peer-to-peer file sharing protocol by default

D.

The registry DWORD controlling this behavior cannot be changed

E.

It always uses a peer-to-peer file sharing protocol

Full Access
Question # 16

Which of the following is a characteristic of a centralized deployment?

A.

Checking Microsoft vulnerabilities at remote site may have significant bandwidth impact

B.

Provides enhanced IPS and HTTP actions

C.

Is optimal for threat protection

D.

Deployed as a Layer-2 channel

E.

Every site has an appliance

Full Access
Question # 17

When configuring policies, which of the following statements is true regarding the indicated property?

Select one:

A.

Irresolvable hosts would match the condition

B.

Negates the criteria inside the property

C.

Negates the criteria outside the property

D.

Modifies the irresolvable condition to TRUE

E.

Negates the "evaluate irresolvable as" setting

Full Access
Question # 18

When configuring policies, which of the following statements is true regarding this image?

A.

The NOT checkbox means the "Evaluate Irresolvable as" should be set to True

B.

The external NOT does not change the meaning of "evaluate irresolvable as"

C.

Has no effect on irresolvable hosts

D.

Negates the criteria inside the property

E.

The NOT checkbox means the "Evaluate Irresolvable as" should be set to False

Full Access
Question # 19

When using Remote Inspection for Windows, which of the following properties require fsprocsvc.exe interactive scripting?

A.

User Directory Common Name

B.

Update Microsoft Vulnerabilities

C.

Windows Expected Script Result

D.

Antivirus Running

E.

Windows Service Running

Full Access
Question # 20

What should be done after the Managed Windows devices are sent to a policy to determine the Windows 10 patch delivery optimization setting?

A.

Push out the proper DWORD setting via GPO

B.

Non Windows 10 devices must be called out in sub-rules since they will not have the relevant DWORD

C.

Manageable Windows devices are not required by this policy

D.

Non Windows 10 devices must be called out in sub-rules so that the relevant DWORD value may be changed

E.

Write sub-rules to check for each of the DWORD values used in patch delivery optimization

Full Access
Question # 21

What is NOT an admission event?

A.

DHCP Request

B.

IP Address Change

C.

Host becomes offline

D.

Login to an authentication server

E.

New VPN user

Full Access
Question # 22

Which of the following is an example of a remediation action?

A.

Start SecureConnector

B.

Start Antivirus update

C.

Assign to VLAN

D.

Switch port block

E.

HTTP login

Full Access
Question # 23

When configuring policy conditions, which of the statements is true regarding this image?

Select one:

A.

Negates the criteria as part of the property

B.

Modifies the irresolvable condition to TRUE

C.

Generates a NOT condition in the sub-rule condition

D.

Irresolvable hosts would match the condition

E.

Modifies the evaluate irresolvable condition to FALSE

Full Access