An administrator wants the Host At Risk event to generate an alarm. What is used to achieve this result?
Correct Answer:C
To generate an alarm from a Host At Risk event, an administrative user must create an Event to Alarm Mapping for the Vulnerability Scan Failed event. Within this alarm mapping, a host security action must be designated to mark the host at risk
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
Correct Answer:B
When FortiNAC is managing VPN clients connecting through FortiGate. why must the clients run a FortiNAC agent?
Correct Answer:B