Questions for the NSE6-FNC-9-1 were updated on : Nov 23 ,2025
What causes a host's state to change to "at risk"?
A
Explanation:
Failure – Indicates that the host has failed the scan. This option can also be set manually. When the
status is set to Failure the host is marked "At Risk" for the selected scan.
Reference:
https://docs.fortinet.com/document/fortinac/8.3.0/administration-guide/241168/host-
health-and-scanning
p. 244 of the Study Guide, "A state of at-risk indicates the host has failed a scan. This could be a
compliance scan or an administrative scan."
By default, if more than 20 hosts are seen connected on a single port simultaneously, what will
happen to the port?
B
Explanation:
Admin Guide p. 754: Threshold Uplink—The Uplink mode has been set as Dynamic and FortiNAC has
determined that the number of MAC addresses on the port exceeds the System Defined Uplink
count. All hosts read on this port are ignored.
When you create a user or host profile; which three criteria can you use? (Choose three.)
CDE
Explanation:
Fortinac-admin-operations, P. 391
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
ABE
With enforcement for network access policies and at-risk hosts enabled, what will happen if a host
matches a network access policy and has a state of "at risk"?
C
Explanation:
https://training.fortinet.com/pluginfile.php/1912463/mod_resource/content/26/FortiNAC_7.2_Stud
y_Guide-Online.pdf C. Page 327 - moved to the quarantine isolation network
Refer to the exhibit, and then answer the question below.
Which host is rogue?
B
Explanation:
Reference:
https://docs.fortinet.com/document/fortinac/8.6.0/administration-
guide/283146/evaluating-rogue-hosts
Where do you look to determine when and why the FortiNAC made an automated network access
change?
B
Explanation:
Reference:
https://docs.fortinet.com/document/fortigate/6.2.3/cookbook/536166/viewing-event-
logs
Study Guide p. 356: Any time FortiNAC changes network access for an endpoint, the change is
documented on the Port Changes view. This provides an administrator with valuable information
when validating control configurations and enforcement.
Which command line shell and scripting language does FortiNAC use for WinRM?
D
Explanation:
Open Windows PowerShell or a command prompt. Run the following command to determine if you
already have WinRM over HTTPS configured.
Reference:
https://docs.fortinet.com/document/fortinac/8.7.0/administration-guide/246310/winrm-
device-profile-requirements-and-setup
Admin Guide on p. 362, "Matches if the device successfully responds to a WinRM client session
request. User name and password credentials are required. If there are multiple credentials, each set
of credentials will be attempted to find a potential match. The commands are used to automate
interaction with the device. Each command is run via Powershell."
What would happen if a port was placed in both the Forced Registration and the Forced Remediation
port groups?
B
Explanation:
Reference:
https://docs.fortinet.com/document/fortinac/8.3.0/administration-
guide/837785/system-groups
Which two of the following are required for endpoint compliance monitors? (Choose two.)
AD
Explanation:
DirectDefense’s analysis of FireEye Endpoint attests that the products help meet the HIPAA Security
Rule.
In the menu on the left click the + sign next to Endpoint Compliance to open it.
Reference:
https://www.fireeye.com/content/dam/fireeye-www/products/pdfs/cg-pci-and-hipaa-
compliances.pdf
https://docs.fortinet.com/document/fortinac/8.5.2/administration-guide/92047/add-or-modify-a-
scan
In which view would you find who made modifications to a Group?
D
Explanation:
It’s important to audit Group Policy changes in order to determine the details of changes made to
Group Policies by delegated users.
Reference:
https://www.lepide.com/how-to/audit-chnages-made-to-group-policy-objects.html
Which three of the following are components of a security rule? (Choose three.)
CDE
Explanation:
Reference:
https://docs.fortinet.com/document/fortinac/8.8.0/administration-guide/167668/add-
or-modify-a-rule
Where are logical network values defined?
A
Explanation:
Reference:
https://www.sciencedirect.com/topics/computer-science/logical-network
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously
appeared on a port that is a member of the Forced Registration port group?
C
What agent is required in order to detect an added USB drive?
A
Explanation:
Expand the Persistent Agent folder. Select USB Detection from the tree.
Reference:
https://docs.fortinet.com/document/fortinac/8.5.2/administration-guide/814147/usb-
detection
1. Click System > Settings.
2. Expand the Persistent Agent folder.
3. Select USB Detection from the tree.
4. Click Add or select an existing USB drive and click Modify.