With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)
When you create a user or host profile; which three criteria can you use? (Choose three.)
Where do you look to determine which network access policy, if any is being applied to a particular host?
Refer to the exhibit.
If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?
Refer to the exhibit.
Considering the host status of the two hosts connected to the same wired port, what will happen if the port is a member of the Forced Registration port group?
An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?
Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)