0% found this document useful (0 votes)
237 views3 pages

FortiClient Quiz Forti Client

This document is a review of an attempt at an NSE 3 FortiClient exam that scored 6/10 points. It shows the 10 questions asked in the exam, indicating which answers were selected and whether they were right or wrong. The feedback stated that the exam was not passed. The questions covered topics like the license required for endpoint visibility, what comprises the FortiClient security stack, the architectural design of FortiClient, and how FortiClient can integrate with other Fortinet security platforms.

Uploaded by

urussanga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
237 views3 pages

FortiClient Quiz Forti Client

This document is a review of an attempt at an NSE 3 FortiClient exam that scored 6/10 points. It shows the 10 questions asked in the exam, indicating which answers were selected and whether they were right or wrong. The feedback stated that the exam was not passed. The questions covered topics like the license required for endpoint visibility, what comprises the FortiClient security stack, the architectural design of FortiClient, and how FortiClient can integrate with other Fortinet security platforms.

Uploaded by

urussanga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

https://training.fortinet.com/mod/quiz/review.php?

attempt=7870590&cmid=45389

 NSE 3 FortiClient

Started on Thursday, August 12, 2021, 9:18 PM


State Finished
Completed on Thursday, August 19, 2021, 8:35 PM
Time taken 6 days 23 hours
Points 6/10
Grade 60 out of 100
Feedback I'm sorry, you did not pass.

Question 1

Incorrect

0 points out of 1

Which additional license is required to gain endpoint visibility and enforce compliance on the network?

Select one:
Endpoint Telemetry and Compliance

FortiGuard Enterprise Bundle 

Windows License Key

FortiGate VDOM

Question 2

Incorrect

0 points out of 1

Which four elements comprise the FortiClient security stack?

Select one:
Endpoint Protection, Secure Email Gateway, Web Application Firewall, and Sandbox

Endpoint Protection, Application Firewall, Security Event Management, and Web Filter 

Endpoint Protection, Internal Segmentation Firewall, Web Filter, and Sandbox

Endpoint Protection, Advanced Threat Protection, Secure Remote Access, and Fabric Agent

Question 3

Incorrect

0 points out of 1

What is the architectural design of FortiClient?

Select one:
Modular

Hierarchical

Distributed

Redundant 

Question 4

8/19/21, 16:36
https://training.fortinet.com/mod/quiz/review.php?attempt=7870590&cmid=45389

Question 4

Incorrect

0 points out of 1

Which FortiClient feature gives an administrator visibility into which software is installed on the endpoint?

Select one:
EMS 

Web Filter

Software Inventory

Fabric Agent

Question 5

Correct

1 points out of 1

With the endpoint telemetry and compliance licenses applied, FortiClient can register with which types of devices to enforce compliance and
share telemetry data with the Security Fabric?

Select one:
FortiGate and FortiAnalyzer 

FortiMail and FortiWeb

FortiSandbox and FortiSIEM

FortiSwitch and FortiAP

Question 6

Correct

1 points out of 1

EMS is used to deploy, automatically provision, and manage which Fortinet endpoint product?

Select one:
FortiClient 

FortiGate

FortiSandbox

FortiMail

Question 7

Correct

8/19/21, 16:36
https://training.fortinet.com/mod/quiz/review.php?attempt=7870590&cmid=45389

Question 8

Correct

1 points out of 1

With which security platform does FortiClient integrate to increase visibility and compliance control?

Select one:
SNMP

Microsoft Windows95

Fortinet Security Fabric 

FortiCare

Question 9

Correct

1 points out of 1

Consider the following: 44% of companies admit to having their endpoints compromised, 30% of those breaches included the installation of
malware, and 16% were ransomware. What conclusion can be drawn?

Select one:
Ransomware is not a threat.

Endpoints are inherently secure.

Endpoints remain the targets of attacks. 

Endpoints do not present an attack surface significant enough to worry about.

Question 10

Correct

1 points out of 1

8/19/21, 16:36

You might also like