Fortinet NSE 6 - FortiNAC 8.5

Here you have the best Fortinet NSE6_FNC-8.5 practice exam questions

  • You have 30 total questions to study from
  • Each page has 5 questions, making a total of 6 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on May 31, 2025
  • This site is not affiliated with or endorsed by Fortinet.
Question 1 of 30

Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)

    Correct Answer: A, B, D

    FortiNAC uses SNMP (Simple Network Management Protocol) to gather information from network devices and manage them. RADIUS (Remote Authentication Dial-In User Service) is utilized for authentication, authorization, and accounting. CLI (Command Line Interface) is used to provide direct control and configuration of network infrastructure devices. These three methods are well-documented and commonly used in network management and security contexts.

Question 2 of 30

Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)

    Correct Answer: B, C, E

    Layer 2 polling of infrastructure devices is triggered by scheduled poll timings which allow regular checks, linkup and linkdown traps indicating changes in the connection status, and a failed Layer 3 poll which implies a fallback to a different polling method to gather necessary information.

Question 3 of 30

How should you configure MAC notification traps on a supported switch?

    Correct Answer: C

    MAC notification traps should be configured on all ports on the switch. This ensures that any changes in the MAC address table are detected and reported, regardless of the port type. Configuring traps on all ports provides comprehensive monitoring and enhanced network security.

Question 4 of 30

Which connecting endpoints are evaluated against all enabled device profiling rules?

    Correct Answer: D

    The question asks which connecting endpoints are evaluated against all enabled device profiling rules. The correct answer is that all hosts are evaluated each time they connect to ensure accurate network security and management. This means every device, regardless of whether it is known, trusted, or rogue, is checked against the profiling rules to determine their status and appropriate access permissions.

Question 5 of 30

What agent is required in order to detect an added USB drive?

    Correct Answer: D

    A persistent agent is required in order to detect an added USB drive. This type of agent continuously monitors the system for any changes, such as the addition of USB drives, ensuring that such events are detected and logged accurately.