Questions for the NSE6-FNC-8-5 were updated on : Nov 23 ,2025
What causes a host's state to change to "at risk"?
A
Explanation:
Failure – Indicates that the host has failed the scan. This option can also be set manually. When the
status is set to Failure the host is marked "At Risk" for the selected scan.
Reference:
https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/241168/host-
health-and-scanning
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will
happen to the port?
B
When you create a user or host profile, which three criteria can you use? (Choose three.)
ABD
Reference:
https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/15797/user-
host-profiles
Which two methods can be used to gather a list of installed applications and application details from
a host? (Choose two)
AD
Reference:
https://developer.apple.com/business/documentation/MDM-Protocol-Reference.pdf
https://docs.oracle.com/en/middleware/idm/identity-governance/12.2.1.3/omusg/managing-application-onboarding.html#GUID-4D0D5B18-A6F5-4231-852E-DB0D95AAE2D1
How are logical networks assigned to endpoints?
D
Reference:
https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/9819/viewing-and-
controlling-network-risks-via-topology-view
In a wireless integration, how does FortiNAC obtain connecting MAC address information?
D
Explanation:
Intelligent Access Points (IAPs) and controllers support two methods of RADIUS based
authentication: RADIUS MAC authentication and 802.1x authentication.
Reference:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/9019f7f8-
200d-11e9-b6f6-f8bc1258b856/FortiNAC_Wireless_Integration_Overview.pdf
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
ABE
In an isolation VLAN. which three services does FortiNAC supply? (Choose three.)
CDE
Reference:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/8bec453a-
b242-11e9-a989-00505692583a/AdminGuide-860-PDF.pdf
With enforcement for network access policies and at-risk hosts enabled, what will happen if a host
matches a network access policy and has a state of "at risk"?
B
Reference:
https://docs.fortinet.com/document/fortinac/8.6.0/administration-guide/49701/policy-
assignment
Which agent can receive and display messages from FortiNAC to the end user?
C
Reference:
https://docs.fortinet.com/document/fortinac/8.7.0/administration-guide/594507/agent-
packages
Refer to the exhibit, and then answer the question below.
Which host is rogue?
B
Reference:
https://docs.fortinet.com/document/fortinac/8.6.0/administration-
guide/283146/evaluating-rogue-hosts
What capability do logical networks provide?
A
Explanation:
NTM also includes reporting utilities such as network and inventory reports. You can generate
reports for subnets, switch ports, and VLANs.
Reference:
https://logicalread.com/network-diagram/#.YBk9ZOgzbIU
Where do you look to determine when and why the FortiNAC made an automated network access
change?
B
Reference:
https://docs.fortinet.com/document/fortigate/6.2.3/cookbook/536166/viewing-event-
logs
Which command line shell and scripting language does FortiNAC use for WinRM?
D
Explanation:
Open Windows PowerShell or a command prompt. Run the following command to determine if you
already have WinRM over HTTPS configured.
Reference:
https://docs.fortinet.com/document/fortinac/8.7.0/administration-guide/246310/winrm-
device-profile-requirements-and-setup
What would happen if a port was placed in both the Forced Registration and the Forced Remediation
port groups?
B
Reference:
https://docs.fortinet.com/document/fortinac/8.3.0/administration-
guide/837785/system-groups