Which three communication methods are used by the FortiNAC to gather information from, and control, infrastructure devices? (Choose three.)
Correct Answer:
ABD
🗳️
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
Correct Answer:
BCD
🗳️
How should you configure MAC notification traps on a supported switch?
Correct Answer:
B
🗳️
Configure SNMP MAC Notification traps on all access ports (do not include uplinks).
Reference:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/be7fcde9-9685-11e9-81a4-00505692583a/
Configuring_Traps_for_MAC_Notification.pdf
Which connecting endpoints are evaluated against all enabled device profiling rules?
Correct Answer:
A
🗳️
FortiNAC process to classify rogue devices and create an organized inventory of known trusted registered devices.
Reference:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/9529d49c-892c-11e9-81a4-00505692583a/
FortiNAC_Device_Profiler_Configuration.pdf