Types of Captive Networks Quiz
37 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In which configuration stage of FortiNAC deployment are devices detected and profiled?

  • Management configuration
  • Configuration wizard
  • Device onboarding (correct)
  • Network modelling

Which interface in FortiNAC is designated as the Service or Application interface by default?

  • ETH2
  • ETH0
  • ETH3
  • ETH1 (correct)

What type of connectivity does FortiNAC require to add devices for endpoint connections during Network modelling?

  • ICMP and HTTPS
  • SSH and Telnet
  • SNMP and ICMP (correct)
  • SNMP and HTTP

Which configuration stage of FortiNAC deployment involves defining captive networks using the configuration wizard?

<p>Network modelling (D)</p> Signup and view all the answers

Which stage of FortiNAC deployment involves providing devices with different access levels based on policy configuration?

<p>Device onboarding (B)</p> Signup and view all the answers

What applications are mentioned as available on the Service or Application interface in FortiNAC?

<p>Web Portal, DHCP Server, DNS Server (D)</p> Signup and view all the answers

What triggers Layer-2 polling in FortiNAC when a link trap is received?

<p>Linkup (A)</p> Signup and view all the answers

Which information is critical for network visibility in FortiNAC and is obtained by polling Layer-3 devices?

<p>MAC-address to IP-address correlation (D)</p> Signup and view all the answers

How can device registration be performed in FortiNAC using a file format method?

<p>CSV file (C)</p> Signup and view all the answers

Which authentication method is NOT supported by FortiNAC for user identification?

<p>Facebook (D)</p> Signup and view all the answers

In FortiNAC, what does the authentication policy override when specified?

<p>User authentication methods in the portal (C)</p> Signup and view all the answers

What is the purpose of the local service in FortiNAC for RADIUS authentication?

<p>MAB processing (C)</p> Signup and view all the answers

What information is populated in a host record on FortiNAC with data from Layer-2 and Layer-3 polling?

<p>MAC address, IP address, switch port, and connection time (A)</p> Signup and view all the answers

What is the purpose of a captive portal page in a network?

<p>To provide additional information or capabilities to resolve non-normal host states (C)</p> Signup and view all the answers

How does FortiNAC handle a host isolated on a wired port?

<p>Shuts down the port, causing the host's link to drop and then re-enables the port (D)</p> Signup and view all the answers

What triggers the captive portal page presentation process in a captive network?

<p>When the host attempts to resolve a domain by name (B)</p> Signup and view all the answers

What role does FortiNAC play when handling DNS requests from isolated hosts?

<p>Responding with its own address masquerading as the domain being resolved (C)</p> Signup and view all the answers

What happens after FortiNAC responds with its own address to an isolated host's DNS query?

<p>FortiNAC presents the appropriate captive portal page to the isolated host (C)</p> Signup and view all the answers

How does FortiNAC handle specific sites that need to resolve correctly for isolated hosts?

<p>By allowing those sites to resolve properly (A)</p> Signup and view all the answers

What is recommended for LDAP access in FortiNAC configuration?

<p>Service-Account (D)</p> Signup and view all the answers

Which VLAN type is used for state-based isolation of hosts in FortiNAC captive networks?

<p>Authentication VLan (C)</p> Signup and view all the answers

What is the purpose of using SSL certificates signed by a public CA for the captive portal in FortiNAC?

<p>To avoid certificate errors (B)</p> Signup and view all the answers

What are the system reserved labels that should not be used as DHCP scope names in FortiNAC configuration?

<p>'ISOL', 'REG', 'DE' (D)</p> Signup and view all the answers

What must be enabled on the FortiGate management interface when adding it to the FortiNAC device inventory?

<p>SNMP, HTTPS, SSH (C)</p> Signup and view all the answers

What type of access is usually required for FortiNAC to manage network devices?

<p>Read-Write SNMP and full SSH access (C)</p> Signup and view all the answers

Why is it important to use certificates with SAN for EAP and EAP-TLS in FortiNAC?

<p>To match authentication and privacy protocols (B)</p> Signup and view all the answers

What is a requirement for FortiNAC network modeling to add devices to the device inventory?

<p>'PING' connectivity to devices (B)</p> Signup and view all the answers

What does using SSL certificates issued by different CAs on FortiNAC depend on?

<p>Functions being used within FortiNAC (B)</p> Signup and view all the answers

What is the purpose of DHCP relay from the production subnet to ETH0 IP in FortiNAC configuration?

<p>For DHCP fingerprinting (B)</p> Signup and view all the answers

What is the purpose of the Registration VLan in captive networks?

<p>Isolate unregistered rogue devices (C)</p> Signup and view all the answers

How does FortiNAC determine if isolation is necessary for a host according to the text?

<p>By applying 'AND' logic between the 'If Host State is' and 'And System Group Membership is' columns (A)</p> Signup and view all the answers

Which type of captive network is used for clients connecting through VPN services?

<p>Virtual private network (D)</p> Signup and view all the answers

What is the purpose of the Authentication VLan in captive networks?

<p>Isolate registered clients during user authentication (A)</p> Signup and view all the answers

How can Logical Networks simplify network policy management according to the text?

<p>By mapping different logical networks with the same access values on individual devices (C)</p> Signup and view all the answers

When does Layer-2 data polling occur according to the text?

<p>For troubleshooting purposes (D)</p> Signup and view all the answers

What type of devices are polled for MAC-address to IP-address correlation using ARP table?

<p>Layer-3 devices (B)</p> Signup and view all the answers

'If both columns in the same row are true' as mentioned in the text refers to which columns?

<p>'If Host State is' and 'And System Group Membership is' (C)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser