During an evaluation of state-based enforcement, an administrator discovers that ports that should not be under enforcement have been added to enforcement groups. In which view would the administrator be able to determine who added the ports to the groups?
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?
Refer to the exhibit.
If you are forcing the registration of unknown (rogue) hosts, and an unknown (rogue) host connects to a port on the switch, what occurs?
While troubleshooting a network connectivity issue, an administrator determines that a device was being automatically provisioned to an incorrect VLAN.
Where would the administrator look to determine when and why FortiNAC made the network access change?
What would happen if a port was placed in both the Forced Registration and the Forced Remediation port groups?
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will happen to the port?
Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)