Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam NSE7_ZTA-7.2 topic 1 question 21 discussion

Actual exam question from Fortinet's NSE7_ZTA-7.2
Question #: 21
Topic #: 1
[All NSE7_ZTA-7.2 Questions]

In which FortiNAC configuration stage do you define endpoint compliance?

  • A. Device onboarding
  • B. Management configuration
  • C. Policy configuration
  • D. Network modeling
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
d567468
5 days, 16 hours ago
Selected Answer: C
In FortiNAC, endpoint compliance is typically defined during the Policy configuration stage. This stage involves setting up policies that determine the requirements for devices to be considered compliant before they are allowed network access. These policies may include checks for antivirus status, operating system patches, and other security criteria.
upvoted 1 times
...
lil_pc1972
3 months, 2 weeks ago
There are four key configuration stages in a FortiNAC deployment: Management configuration is where all the administrative tasks are carried out, like licensing, configuring management interfaces, uploading SSL certificates for agent communication, captive portal. The configuration wizard is used to define the FortiNAC captive networks. Network modelling is where you will add the devices for the endpoints to be connected, for example, FortiGate, FortiSwitch, FortiAP. To model devices, FortiNAC requires SNMP and ICMP connectivity to these devices. Device onboarding is where devices are detected and profiled, for example, corporate devices, BYOD, IoT. After the device is detected and profiled, the device is registered and provided with different access levels based on policy configuration. Policy configuration decides the different access levels that can be provided to a device, based on device profiles, endpoint compliance.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
ex Want to SAVE BIG on Certification Exam Prep?
close
ex Unlock All Exams with ExamTopics Pro 75% Off
  • arrow Choose From 1000+ Exams
  • arrow Access to 10 Exams per Month
  • arrow PDF Format Available
  • arrow Inline Discussions
  • arrow No Captcha/Robot Checks
Limited Time Offer
Ends in