Fortinet NSE 6 - FortiNAC 8.5

Here you have the best Fortinet NSE6_FNC-8.5 practice exam questions

  • You have 30 total questions across 6 pages (5 per page)
  • These questions were last updated on March 20, 2026
  • This site is not affiliated with or endorsed by Fortinet.
Question 1 of 30

Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)
Answer

Suggested Answer

The suggested answer is A, B, D.

FortiNAC uses SNMP (Simple Network Management Protocol) to gather information from network devices and manage them. RADIUS (Remote Authentication Dial-In User Service) is utilized for authentication, authorization, and accounting. CLI (Command Line Interface) is used to provide direct control and configuration of network infrastructure devices. These three methods are well-documented and commonly used in network management and security contexts.

Community Votes5 votes
ABDSuggested
100%
Question 2 of 30

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
Answer

Suggested Answer

The suggested answer is B, C, E.

Layer 2 polling of infrastructure devices is triggered by scheduled poll timings which allow regular checks, linkup and linkdown traps indicating changes in the connection status, and a failed Layer 3 poll which implies a fallback to a different polling method to gather necessary information.

Community Votes2 votes
BCDMost voted
100%
Question 3 of 30

How should you configure MAC notification traps on a supported switch?
Answer

Suggested Answer

The suggested answer is C.

MAC notification traps should be configured on all ports on the switch. This ensures that any changes in the MAC address table are detected and reported, regardless of the port type. Configuring traps on all ports provides comprehensive monitoring and enhanced network security.

Question 4 of 30

Which connecting endpoints are evaluated against all enabled device profiling rules?
Answer

Suggested Answer

The suggested answer is D.

The question asks which connecting endpoints are evaluated against all enabled device profiling rules. The correct answer is that all hosts are evaluated each time they connect to ensure accurate network security and management. This means every device, regardless of whether it is known, trusted, or rogue, is checked against the profiling rules to determine their status and appropriate access permissions.

Community Votes2 votes
CMost voted
100%
Question 5 of 30

What agent is required in order to detect an added USB drive?
Answer

Suggested Answer

The suggested answer is D.

A persistent agent is required in order to detect an added USB drive. This type of agent continuously monitors the system for any changes, such as the addition of USB drives, ensuring that such events are detected and logged accurately.

About the Fortinet NSE6_FNC-8.5 Certification Exam

About the Exam

The Fortinet NSE6_FNC-8.5 (Fortinet NSE 6 - FortiNAC 8.5) validates your knowledge and skills. Passing demonstrates proficiency and can boost your career prospects in the field.

How to Prepare

Work through all 30 practice questions across 6 pages. Focus on understanding the reasoning behind each answer rather than memorizing responses to be ready for any variation on the real exam.

Why Practice Exams?

Practice exams help you familiarize yourself with the question format, manage your time, and reduce anxiety on the test day. Our NSE6_FNC-8.5 questions are regularly updated to reflect the latest exam objectives.