Fortinet NSE5_FCT-7.0 Exam Practice Questions (P. 2)
- Full Access (45 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
An administrator deploys a FortiClient installation through the Microsoft AD group policy. After the installation is complete, all the custom configuration is missing.
What could have caused this problem?
What could have caused this problem?
- AThe FortiClient MST file is missing from the distribution package.Most Voted
- BThe FortiClient package is not assigned to the group.
- CThe FortiClient .exe file is included in the distribution package.
- DFortiClient does not have permission to access the distribution package.
Correct Answer:
B
B

If a FortiClient installation through Microsoft AD group policy results in missing custom configurations, it's typically due to the absence of the MST file from the distribution package. The MST, or transform file, modifies the MSI installer to include those custom settings. Having only the MSI file means the default configuration is applied, leading to the absence of any pre-set customizations intended for the deployment. Always check that both MSI and MST files are included and correctly linked in the distribution package.
send
light_mode
delete
Question #7
An administrator installs FortiClient on Windows Server.
What is the default behavior of real-time protection control?
What is the default behavior of real-time protection control?
- AReal-time protection must update AV signature database.
- BReal-time protection is disabled.Most Voted
- CReal-time protection sends malicious files to FortiSandbox when the file is not detected locally.
- DReal-time protection must update the signature database from FortiSandbox.
Correct Answer:
B
B

The default configuration for FortiClient on server operating systems, such as Windows Server, includes the automatic disabling of real-time protection. This setting minimizes potential compatibility issues with other server applications like MS Exchange or SQL Server, ensuring stable server operations without compromising the overall security infrastructure. The protocol is designed to prioritize system performance and stability on critical applications typically run on servers.
send
light_mode
delete
Question #8
Refer to the exhibit, which shows the output of the ZTNA traffic log on FortiGate.

What can you conclude from the log message?

What can you conclude from the log message?
- AThe remote user connection does not match the explicit proxy policy.
- BThe remote user connection does not match the ZTNA server configuration.Most Voted
- CThe remote user connection does not match the ZTNA firewall policy.
- DThe remote user connection does not match the ZTNA rule configuration.
Correct Answer:
C
C
send
light_mode
delete
Question #9
What action does FortiClient anti-exploit detection take when it detects exploits?
- ADeletes the compromised application process
- BBlocks memory allocation to the compromised application process
- CTerminates the compromised application processMost Voted
- DPatches the compromised application process
Correct Answer:
C
C

When FortiClient's anti-exploit detection identifies an exploit in an application, it promptly terminates the compromised application process. This immediate action helps to safeguard the endpoint from potential damage or data breaches that could result from the exploit executing its malicious activities further. FortiClient acts on this by monitoring applications prone to exploits such as browsers, Java/Flash plug-ins, and various commonly used office applications, ensuring robust security against zero-day attacks and similar threats.
send
light_mode
delete
Question #10
Refer to the exhibit.

Based on the settings shown in the exhibit, which action will FortiClient take when users try to access www facebook.com?

Based on the settings shown in the exhibit, which action will FortiClient take when users try to access www facebook.com?
- AFortiClient will prompt a warning message to warn the user before they can access the Facebook website.
- BFortiClient will block access to Facebook and its subdomains.
- CFortiClient will monitor only the user’s web access to the Facebook website.
- DFortiClient will allow access to Facebook.Most Voted
Correct Answer:
D
D
send
light_mode
delete
All Pages