Podcast
Questions and Answers
Which method is used to determine the OS of the device using the Fortinet IoT query service?
Which method is used to determine the OS of the device using the Fortinet IoT query service?
What is required to enable the FortiGuard device profiling method?
What is required to enable the FortiGuard device profiling method?
Which method configures the FortiNAC device to attempt to open a connection with the device it is trying to profile?
Which method configures the FortiNAC device to attempt to open a connection with the device it is trying to profile?
What is required for the IP range method to result in a match?
What is required for the IP range method to result in a match?
Signup and view all the answers
Which method evaluates network traffic generated or received by the device being profiled?
Which method evaluates network traffic generated or received by the device being profiled?
Signup and view all the answers
What is required to leverage the ONVIF profiling method?
What is required to leverage the ONVIF profiling method?
Signup and view all the answers
Which method uses p0f, a passive TCP/IP fingerprinting tool?
Which method uses p0f, a passive TCP/IP fingerprinting tool?
Signup and view all the answers
What must be set up to use firewall session polling?
What must be set up to use firewall session polling?
Signup and view all the answers
Which option must be used to match against attributes like Category, Subcategory, Vendor, Model, Operating System, Sub Operating System?
Which option must be used to match against attributes like Category, Subcategory, Vendor, Model, Operating System, Sub Operating System?
Signup and view all the answers
What is used to determine a match in the location method?
What is used to determine a match in the location method?
Signup and view all the answers
Which method attempts to load a page and/or enter designated credentials to profile a device?
Which method attempts to load a page and/or enter designated credentials to profile a device?
Signup and view all the answers
What does the FortiGuard method use to determine the OS of the device?
What does the FortiGuard method use to determine the OS of the device?
Signup and view all the answers
What does the active method use to match a connected host?
What does the active method use to match a connected host?
Signup and view all the answers
What does the DHCP fingerprinting method evaluate?
What does the DHCP fingerprinting method evaluate?
Signup and view all the answers
What does the FortiGate method leverage to determine a match?
What does the FortiGate method leverage to determine a match?
Signup and view all the answers
Which custom attributes are supported by the DHCP fingerprinting method?
Which custom attributes are supported by the DHCP fingerprinting method?
Signup and view all the answers
What is used to match a custom value in the active method?
What is used to match a custom value in the active method?
Signup and view all the answers
What is ignored when using the Match Custom Attributes option in DHCP fingerprinting?
What is ignored when using the Match Custom Attributes option in DHCP fingerprinting?
Signup and view all the answers
What does the FortiGate method return a pass for?
What does the FortiGate method return a pass for?
Signup and view all the answers
What does the FortiGate method evaluate against in the Match Custom Attributes option?
What does the FortiGate method evaluate against in the Match Custom Attributes option?
Signup and view all the answers
What does the active method allow to customize for almost any environment?
What does the active method allow to customize for almost any environment?
Signup and view all the answers
What does the DHCP fingerprinting method identify using option lists and parameters seen in the DHCP packets?
What does the DHCP fingerprinting method identify using option lists and parameters seen in the DHCP packets?
Signup and view all the answers
What is used to match a connected host in the active method instead of using the existing database entries?
What is used to match a connected host in the active method instead of using the existing database entries?
Signup and view all the answers
What does the DHCP fingerprinting method use to evaluate against defined hostname or operating system values?
What does the DHCP fingerprinting method use to evaluate against defined hostname or operating system values?
Signup and view all the answers