Podcast
Questions and Answers
What does FortiNAC display a rogue device as on the GUI?
What does FortiNAC display a rogue device as on the GUI?
- A laptop image with a question mark on the screen (correct)
- A smartphone image with a question mark on the screen
- A server image with a question mark on the screen
- A desktop computer image with a question mark on the screen
How are rogue devices often referred to?
How are rogue devices often referred to?
- Known and trusted endpoints
- Secure and classified endpoints
- Unknown or untrusted endpoints (correct)
- Identified and authorized endpoints
What is the default logical network used to isolate rogue hosts at the point of connection when enforcement is enabled?
What is the default logical network used to isolate rogue hosts at the point of connection when enforcement is enabled?
- Authentication
- Registration (correct)
- Authorization
- Validation
What is a foundation of visibility created from the information that FortiNAC gathers from endpoints?
What is a foundation of visibility created from the information that FortiNAC gathers from endpoints?
What tool is used to classify connected devices by using administratively created rules?
What tool is used to classify connected devices by using administratively created rules?
What elements are included in the collection of endpoints?
What elements are included in the collection of endpoints?
What is the method used by the device profiling tool to identify the type of device?
What is the method used by the device profiling tool to identify the type of device?
What is enforced by the Forced Registration port group?
What is enforced by the Forced Registration port group?
What does a rogue device represent in FortiNAC?
What does a rogue device represent in FortiNAC?
What is the method used to isolate rogue hosts at the point of connection?
What is the method used to isolate rogue hosts at the point of connection?
What is the purpose of the device profiling tool?
What is the purpose of the device profiling tool?
What is the role of the logical network called Registration?
What is the role of the logical network called Registration?
What is used to identify devices as they connect to the network?
What is used to identify devices as they connect to the network?
How does FortiNAC determine if a device is a match for the selected device type?
How does FortiNAC determine if a device is a match for the selected device type?
What are endpoints classified as after they have been evaluated and considered trusted?
What are endpoints classified as after they have been evaluated and considered trusted?
What is the purpose of device profiling rules?
What is the purpose of device profiling rules?
How does FortiNAC apply the rule-defined classification settings?
How does FortiNAC apply the rule-defined classification settings?
What method does the 'Valve Control System' rule use for evaluation?
What method does the 'Valve Control System' rule use for evaluation?
Which components are used to evaluate and classify unknown, untrusted devices?
Which components are used to evaluate and classify unknown, untrusted devices?
What is the purpose of evaluating a device against each rule until a fail, pass, or cannot evaluate result is reached?
What is the purpose of evaluating a device against each rule until a fail, pass, or cannot evaluate result is reached?
What is the purpose of entering user-defined values in device profiling?
What is the purpose of entering user-defined values in device profiling?
What does the 'Epson Robotics' rule use for evaluation?
What does the 'Epson Robotics' rule use for evaluation?
What is the primary method used by the 'HVAC' rule for evaluation?
What is the primary method used by the 'HVAC' rule for evaluation?
What is the first step in classifying an industrial device according to the text?
What is the first step in classifying an industrial device according to the text?