FCP_FCT_AD-7.2 Online Practice Questions

Home / Fortinet / FCP_FCT_AD-7.2

Latest FCP_FCT_AD-7.2 Exam Practice Questions

The practice questions for FCP_FCT_AD-7.2 exam was last updated on 2025-06-03 .

Viewing page 1 out of 4 pages.

Viewing questions 1 out of 20 questions.

Question#1

Refer to the exhibit.



Based on the Security Fabric automation settings, what action will be taken on compromised endpoints?

A. Endpoints will be quarantined through EMS
B. Endpoints will be banned on FortiGate
C. An email notification will be sent for compromised endpoints
D. Endpoints will be quarantined through FortiSwitch

Explanation:
Based on the Security Fabric automation settings shown in the exhibit:
The automation stitch is configured with a trigger for a "Compromised Host."
The action specified for this trigger is "Quarantine FortiClient via EMS."
This indicates that when an endpoint is detected as compromised, FortiClient EMS will quarantine the endpoint as part of the automation process.
Therefore, the action taken on compromised endpoints will be to quarantine them through EMS.
Reference
FortiGate Security 7.2 Study Guide, Automation Stitches and Actions Section Fortinet Documentation on Configuring Automation Stitches and Quarantine Actions

Question#2

Which three features does FortiClient endpoint security include? (Choose three.)

A. DLP
B. Vulnerability management
C. L2TP
D. lPsec
E. Real-lime protection

Explanation:
Understanding FortiClient Features:
FortiClient endpoint security includes several features aimed at protecting and managing endpoints.
Evaluating Feature Set:
Vulnerability management is a key feature of FortiClient, helping to identify and address vulnerabilities (B).
IPsec is supported for secure VPN connections (D).
Real-time protection is crucial for detecting and preventing threats in real-time (E).
Eliminating Incorrect Options:
Data Loss Prevention (DLP) (A) is typically managed by FortiGate or FortiMail.
L2TP (C) is a protocol used for VPNs but is not specifically a feature of FortiClient endpoint security.
Reference: FortiClient endpoint security features documentation from the study guides.

Question#3

Refer to the exhibits.






Based on the FortiGate Security Fabric settings shown in the exhibits, what must an administrator do on the EMS server to successfully quarantine an endpoint.
When it is detected as a compromised host (loC)?

A. The administrator must enable remote HTTPS access to EM
B. The administrator must enable FQDN on EM
C. The administrator must authorize FortiGate on FortiAnalyzer.
D. The administrator must enable SSH access to EM

Explanation:
Based on the FortiGate Security Fabric settings shown in the exhibits, to successfully quarantine an endpoint when it is detected as a compromised host (IOC), the following step is required:
Enable Remote HTTPS Access to EMS: This setting allows FortiGate to communicate securely with FortiClient EMS over HTTPS. Remote HTTPS access is essential for the quarantine functionality to operate correctly, enabling the EMS server to receive and act upon the quarantine commands from FortiGate.
Therefore, the administrator must enable remote HTTPS access to EMS to allow the quarantine process to function properly.
Reference
FortiGate Infrastructure 7.2 Study Guide, Security Fabric and Integration with EMS Sections Fortinet Documentation on Enabling Remote HTTPS Access to FortiClient EMS

Question#4

Exhibit.



Based on the logs shown in the exhibit, why did FortiClient EMS tail to install FortiClient on the endpoint?

A. The FortiClient antivirus service is not running.
B. The Windows installer service is not running.
C. The remote registry service is not running.
D. The task scheduler service is not running.

Explanation:
https://community.fortinet.com/t5/FortiClient/Technical-Note-FortiClient-fails-to-install-from-FortiClient-EMS/ta-p/193680
The deployment service error message may be caused by any of the following. Try eliminating them all, one at a time.

Question#5

1.Refer to the exhibit, which shows FortiClient EMS deployment, profiles.



When an administrator creates a deployment profile on FortiClient EMS.
Which statement about the deployment profile is true?

A. Deployment-2 will upgrade FortiClient on both the AD group and workgroup.
B. Deployment-1 will install FortiClient on new AO group endpoints.
C. Deployment-2 will install FortiClient on both the AD group and workgroup.
D. Deployment-1 will upgrade FortiClient only on the workgroup.

Explanation:
Deployment Profiles Analysis:
Deployment-1 has the "First-Time-Installation" package and is assigned to "All Groups" with a priority of 1 but is not enabled.
Deployment-2 has the "To-Upgrade" package, is assigned to both "All Groups" and "trainingAD.training.lab," with a priority of 2 and is enabled. Evaluating Deployment-2:
Deployment-2 will upgrade FortiClient on both "All Groups" and "trainingAD.training.lab" since it is enabled and assigned to these groups. This includes both AD (Active Directory) groups and workgroups.
Conclusion:
Since Deployment-2 is set to upgrade FortiClient on all the assigned groups and workgroups, the correct answer is A.
Reference: FortiClient EMS deployment and profile documentation from the study guides.

Exam Code: FCP_FCT_AD-7.2Q & A: 55 Q&AsUpdated:  2025-06-03

 Get All FCP_FCT_AD-7.2 Q&As