Big Cyber Monday Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Forescout FSCP Forescout Certified Professional Exam Exam Practice Test

Demo: 24 questions
Total 80 questions

Forescout Certified Professional Exam Questions and Answers

Question 1

Place the DNS Enforce control actions into the correct workflow order for endpoints which have a pending control action.

Options:

Question 2

When creating a new "Send Mail" notification action, which email is used by default?

Options:

A.

The email configured under Options > General > Mail

B.

The email address of the last logged in user

C.

The Tech Support email

D.

The email that was used when registering the license

E.

The email entered in the send mail action on the rule

Question 3

When using the "Assign to VLAN action," why might it be useful to have a policy to record the original VLAN?

Select one:

Options:

A.

Since CounterACT reads the startup config to find the original VLAN, network administrators making changes to switch running configs could overwrite this VLAN information

B.

Since CounterACT reads the running config to find the original VLAN, network administrators saving configuration changes to switches could overwrite this VLAN information

C.

Since CounterACT reads the running config to find the original VLAN, network administrators making changes to switch running configs could overwrite this VLAN information

D.

Since CounterACT reads the running config to find the original VLAN, any changes to switch running configs could overwrite this VLAN information

E.

Since CounterACT reads the startup config to find the original VLAN, network administrators saving configuration changes to switches could overwrite this VLAN information

Question 4

How are additional recipients added to a "Send Mail" action?

Options:

A.

Thru the setting on Tools > Options > General > Mail and adding the recipients separated by commas

B.

Thru the policy "Send Mail" action, under the Parameters tab add the recipients separated by commas

C.

Thru Tools > Options > Advanced - Mail and adding the recipients separated by semi-colons

D.

Thru the Tools > Options > NAC Email and adding the recipients separated by semi-colons

E.

Thru the policy sub rule and adding a condition for each of the desired recipients

Question 5

Why would the patch delivery optimization mechanism used for Windows 10 updates be a potential security concern?

Options:

A.

It can be configured to use a peer-to-peer file sharing protocol

B.

CounterACT cannot initiate Windows updates for Windows 10 devices

C.

It uses a peer-to-peer file sharing protocol by default

D.

The registry DWORD controlling this behavior cannot be changed

E.

It always uses a peer-to-peer file sharing protocol

Question 6

Which of the following requires secure connector to resolve?

Options:

A.

Authentication login (advanced)

B.

Authentication certificate status

C.

HTTP login user

D.

Authentication login

E.

Signed-In status

Question 7

When using the discover properties OS, Function, Network Function and NIC Vendor and Module, certain hosts may not be correctly profiled. What else may be used to provide additional possible details to assist in correctly profiling the host?

Options:

A.

Monitoring traffic

B.

Packet engine

C.

Advanced Classification

D.

NMAP Scanning

E.

Function

Question 8

Which of the following is true regarding CounterACT 8 FLEXX Licensing?

Options:

A.

CounterACT 8 can be installed on all CTxx and 51xx models.

B.

Disaster Recovery is used for member appliances.

C.

For member appliances, HA and Failover Clustering are part of Resiliency licensing.

D.

Changing the licensing of the deployment from Per Appliance Licensing to FLEXX Licensing can be done through the Customer Portal.

E.

Failover Clustering is used with EM and RM.

Question 9

When configuring policies, which of the following statements is true regarding this image?

Options:

A.

The NOT checkbox means the "Evaluate Irresolvable as" should be set to True

B.

The external NOT does not change the meaning of "evaluate irresolvable as"

C.

Has no effect on irresolvable hosts

D.

Negates the criteria inside the property

E.

The NOT checkbox means the "Evaluate Irresolvable as" should be set to False

Question 10

When configuring policies, which of the following statements is true regarding the indicated property?

Select one:

Options:

A.

Irresolvable hosts would match the condition

B.

Negates the criteria inside the property

C.

Negates the criteria outside the property

D.

Modifies the irresolvable condition to TRUE

E.

Negates the "evaluate irresolvable as" setting

Question 11

Which two of the following are main uses of the User Directory plugin? (Choose Two)

Options:

A.

Verify authentication credentials

B.

Define authentication traffic

C.

Perform Radius authorization

D.

Query user details

E.

Populate the Dashboard

Question 12

Which of the following is an advantage of FLEXX licensing?

Options:

A.

License is centralized by an appliance by combining hardware and software

B.

Licensing is centralized and managed by an Enterprise Manager

C.

With FLEXX license, you can add See + Control + Resiliency as a base License

D.

FLEXX licensing is offered with V7 and V8 Resiliency and Advanced Compliance licenses

E.

FLEXX licensing works in V7 or on CTxx appliances

Question 13

What is the default recheck timer for a NAC policy?

Options:

A.

24 hours

B.

8 hours

C.

4 hours

D.

12 hours

E.

2 hours

Question 14

Which of the following is true regarding Failover Clustering module configuration?

Options:

A.

Once appliances are configured, then press the Apply button.

B.

Segments should be assigned to appliance folders and NOT to the individual appliances.

C.

You can see the status of failover by selecting IP Assignments and failover tab.

D.

Configure the second HA on the Secondary node.

E.

Place only the EM to participate in failover in the folder.

Question 15

What are the important network traffic types that should be monitored by CounterACT?

Options:

A.

Encrypted/Tunneled networks, DHCP, Web traffic

B.

LWAP traffic, DHCP, Backup Networks

C.

Backup Networks, Encrypted/Tunneled networks, DHCP

D.

Web traffic, Authentication traffic, DHCP

E.

LWAP traffic, Authentication traffic, Backup Networks

Question 16

Which of the following User Directory server settings is necessary to enable guest approval by sponsors?

Options:

A.

Policy to control

B.

Guest Tags

C.

Sponsor Group

D.

Guest password policy

E.

Authentication Server

Question 17

Which of the following is true regarding how CounterACT restores a quarantined endpoint to its original production VLAN after the "Assign to VLAN Action" is removed?

Options:

A.

This happens automatically because CounterACT compares the running and startup configs

B.

This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not changed in the switch running config

C.

This happens automatically as long as no configuration changes to the switch are made to the running config

D.

This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not saved in the startup config

E.

A policy is required to ensure this happens correctly.

Question 18

Which of the following are endpoint attributes learned from the Switch plugin?

Options:

A.

Host Name, Mac table, Switch IP, Port Description, Host Table, Switch Version

B.

Port VLAN, Switch Version, Mac address, Host name, Port Description, ARP Table, Switch Version

C.

Mac address, Host name, Port VLAN, Port Description, Switch OS, Switch Version

D.

Switch Version, Mac address, Switch OS, Port VLAN, Host Name, ARP Table

E.

Mac address, Switch IP and Port name, ARP Table, Switch Port Information

Question 19

Select the action that requires symmetrical traffic.

Options:

A.

Assign to VLAN

B.

WLAN block

C.

Endpoint ACL

D.

Start SecureConnector

E.

Virtual Firewall

Question 20

What should be done after the Managed Windows devices are sent to a policy to determine the Windows 10 patch delivery optimization setting?

Options:

A.

Push out the proper DWORD setting via GPO

B.

Non Windows 10 devices must be called out in sub-rules since they will not have the relevant DWORD

C.

Manageable Windows devices are not required by this policy

D.

Non Windows 10 devices must be called out in sub-rules so that the relevant DWORD value may be changed

E.

Write sub-rules to check for each of the DWORD values used in patch delivery optimization

Question 21

Which field is NOT editable in the User Directory plugin once it is configured?

Options:

A.

Administrator

B.

Server Name

C.

Password

D.

Address

E.

Port

Question 22

When configuring policy conditions, which of the statements is true regarding this image?

Select one:

Options:

A.

Negates the criteria as part of the property

B.

Modifies the irresolvable condition to TRUE

C.

Generates a NOT condition in the sub-rule condition

D.

Irresolvable hosts would match the condition

E.

Modifies the evaluate irresolvable condition to FALSE

Question 23

Which of the following properties can be determined by the HPS Plugin? (Choose two)

Options:

A.

Application installed on Mac OS

B.

External Device on Windows

C.

Operating System

D.

AD group membership

E.

HTTP banner

Question 24

How can scripts be run when the Endpoint Remote Inspection method is set to "Using MS-WMI"?

Options:

A.

Using Task Scheduler but this has limitations

B.

Using WMI, which will allow interactive scripts to run

C.

Using RRP, which will allow interactive scripts to run

D.

Using WMI, but they may not be run interactively using this method

E.

Using fsprocserv.exe, but scripts may not be run interactively using this method

Demo: 24 questions
Total 80 questions