NSE5_FCT-7.0 Dumps

NSE5_FCT-7.0 Braindumps NSE5_FCT-7.0 Real Questions NSE5_FCT-7.0 Practice Test NSE5_FCT-7.0 Actual Questions


Fortinet


NSE5_FCT-7.0


NSE 5 - FortiClient EMS 7.0


https://killexams.com/pass4sure/exam-detail/NSE5_FCT-7.0

Question: 146


Refer to the exhibits.




Which shows the configuration of endpoint policies.


Based on the configuration, what will happen when someone logs in with the user account student on an endpoint in the training AD domain?


  1. FortiClient EMS will assign the Sales policy

  2. FortiClient EMS will assign the Training policy

  3. FortiClient EMS will assign the Default policy

  4. FortiClient EMS will assign the Training policy for on-fabric endpoints and the Sales policy for the off-fabric endpoint


Answer: C Question: 147 Refer to the exhibit.


Based on the settings shown in the exhibit, which two actions must the administrator take to make the endpoint compliant? (Choose two.)


  1. Enable the webfilter profile

  2. Integrate FortiSandbox for infected file analysis

  3. Patch applications that have vulnerability rated as high or above

  4. Run Calculator application on the endpoint


Answer: A,D Question: 148

An administrator has a requirement to add user authentication to the ZTNA access for remote or off-fabric users. Which FortiGate feature is required m addition to ZTNA?

  1. FortiGate FSSO

  2. FortiGate certificates

  3. FortiGate explicit proxy

  4. FortiGate endpoint control


Answer: C Question: 149

What action does FortiClient anti-exploit detection take when it detects exploits?


  1. Terminates the compromised application process

  2. Blocks memory allocation to the compromised application process

  3. Patches the compromised application process

  4. Deletes the compromised application process


Answer: A Question: 150 Refer to the exhibit.


Which shows multiple endpoint policies on FortiClient EMS.


Which policy is applied to the endpoint in the AD group training AD?


  1. The Sales policy

  2. The Training policy

  3. Both the Sales and Training policies because their priority is higher than the Default policy

  4. The Default policy because it has the highest priority


Answer: C Question: 151 Refer to the exhibit.


Based on the FortiClient log details shown in the exhibit, which two statements are true? (Choose two.)


  1. The filename is Unconfirmed 899290 .crdownload.

  2. The file status is Quarantined

  3. The filename is sent to ForuSandbox for further inspection.

  4. The file location IS ??D:Users.


Answer: A,B Question: 152 Refer to the exhibit.


Based on the logs shown in the exhibit, why did FortiClient EMS fail to install FortiClient on the endpoint?


  1. The remote registry service is not running

  2. The Windows installer service is not running

  3. The task scheduler service is not running.

  4. The FortiClient antivirus service is not running


Answer: C Question: 153

An administrator installs FortiClient EMS in the enterprise.


Which component is responsible for enforcing protection and checking security posture?


  1. FortiClient vulnerability scan

  2. FortiClient EMS tags

  3. FortiClient EMS

  4. FortiClient


Answer: D Question: 154

Which three features does FortiClient endpoint security include? (Choose three.)


  1. L2TP

  2. Real-time protection

  3. DLP

  4. Vulnerability management

  5. IPsec


Answer: A,B,D,E Question: 155

A new chrome book is connected in a school's network.


Which component can the EMS administrator use to manage the FortiClient web filter extension installed on the

Google Chromebook endpoint?


  1. FortiClient EMS

  2. FortiClient site categories

  3. FortiClient customer URL list

  4. FortiClient web filter extension


Answer: D Question: 156

A FortiClient EMS administrator has enabled the compliance rule for the sales department. Which Fortinet device will enforce compliance with dynamic access control?

  1. FortiClient

  2. FortiClient EMS

  3. FortiGate

  4. FortiAnalyzer


Answer: C Question: 157

An administrator configures ZTNA configuration on the FortiGate for remote users. Which statement is true about the firewall policy?

  1. It enforces access control

  2. It redirects the client request to the access proxy

  3. It defines the access proxy

  4. It applies security profiles to protect traffic


Answer: B


Explanation:


https://docs.fortinet.com/document/fortigate/7.0.0/new-features/194961/basic-ztna-configuration


Question: 158


An administrator wants to simplify remote access without asking users to provide user credentials. Which access control method provides this solution?

  1. SSL VPN

  2. ZTNA full mode

  3. L2TP

  4. ZTNA IP/MAC filtering mode


Answer: B

Question: 159


Why does FortiGate need the root CA certificate of FortiClient EMS?


  1. To sign FortiClient CSR requests

  2. To revoke FortiClient client certificates

  3. To trust certificates issued by FortiClient EMS

  4. To update FortiClient client certificates


Answer: D Question: 160

Which two statements are true about ZTNA? (Choose two.)


  1. ZTNA provides role-based access

  2. ZTNA manages access for remote users only

  3. ZTNA manages access through the client only

  4. ZTNA provides a security posture check


Answer: B