NSE5_FNC_AD_7.6 Online Practice Questions

Home / Fortinet / NSE5_FNC_AD_7.6

Latest NSE5_FNC_AD_7.6 Exam Practice Questions

The practice questions for NSE5_FNC_AD_7.6 exam was last updated on 2026-01-07 .

Viewing page 1 out of 2 pages.

Viewing questions 1 out of 12 questions.

Question#1

Refer to the exhibit.



If a host is connected to a port in the Building 1 First Floor Ports group, what must also be true to match this user/host profile?

A. The host must have a role value of contractor, an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 P
B. The host must have a role value of contractor or an installed persistent agent, a security access value of contractor, and be connected between 9 AM and 5 P
C. The host must have a role value of contractor or an installed persistent agent or a security access value of contractor, and be connected between 6 AM and 5 P
D. The host must have a role value of contractor or an installed persistent agent and a security access value of contractor, and be connected between 6 AM and 5 P

Explanation:
The User/Host Profile in FortiNAC-F is the fundamental logic engine used to categorize endpoints for policy assignment. As seen in the exhibit, the configuration uses a combination of Boolean logic operators (OR and AND) to define the "Who/What" attributes.
According to the FortiNAC-F Administrator Guide, attributes grouped together within the same bracket or connected by an OR operator require only one of those conditions to be met. In the exhibit, the first two attributes are "Host Role = Contractor" OR "Host Persistent Agent = Yes". This forms a single logical block. This block is then joined to the third attribute ("Host Security Access Value = Contractor") by an AND operator. Consequently, a host must satisfy at least one of the first two conditions AND satisfy the third condition to match the "Who/What" section.
Furthermore, the profile includes Location and When (time) constraints. The exhibit shows the location is restricted to the "Building 1 First Floor Ports" group. The "When" schedule is explicitly set to Mon-Fri 6:00 AM - 5:00 PM. For a profile to match, all enabled sections (Who/What, Locations, and When) must be satisfied simultaneously. Therefore, the host must meet the conditional contractor/agent criteria, possess the specific security access value, and connect during the defined 6 AM to 5 PM window.
"User/Host Profiles use a combination of attributes to identify a match. Attributes joined by OR require any one to be true, while attributes joined by AND must all be true. If a Schedule (When) is applied, the host must also connect within the specified timeframe for the profile to be considered a match. All criteria in the Who/What, Where, and When sections are cumulative." ― FortiNAC-F Administration Guide: User/Host Profile Configuration.

Question#2

Refer to the exhibits.



What would happen if the highlighted port with connected hosts was placed in both the Forced Registration and Forced Remediation port groups?

A. Both types of enforcement would be applied
B. Enforcement would be applied only to rogue hosts
C. Multiple enforcement groups could not contain the same port.
D. Only the higher ranked enforcement group would be applied.

Explanation:
In FortiNAC-F, Port Groups are used to apply specific enforcement behaviors to switch ports. When a port is assigned to an enforcement group, such as Forced Registration or Forced Remediation, FortiNAC-F overrides normal policy logic to force all connected adapters into that specific state. The exhibit shows a port (IF#13) with "Multiple Hosts" connected, which is a common scenario in environments using unmanaged switches or hubs downstream from a managed switch port.
According to the FortiNAC-F Administrator Guide, it is possible for a single port to be a member of
multiple port groups. However, when those groups have conflicting enforcement actions―such as one group forcing a registration state and another forcing a remediation state―FortiNAC-F utilizes a ranking system to resolve the conflict. In the FortiNAC-F GUI under Network > Port Management > Port Groups, each group is assigned a rank. The system evaluates these ranks, and only the higher ranked enforcement group is applied to the port. If a port is in both a Forced Registration group and a Forced Remediation group, the group with the numerical priority (rank) will dictate the VLAN and access level assigned to all hosts on that port.
This mechanism ensures consistent behavior across the fabric. If the ranking determines that "Forced Registration" is higher priority, then even a known host that is failing a compliance scan (which would normally trigger Remediation) will be held in the Registration VLAN because the port-level enforcement takes precedence based on its rank.
"A port can be a member of multiple groups. If more than one group has an enforcement assigned, the group with the highest rank (lowest numerical value) is used to determine the enforcement for the port. When a port is placed in a group with an enforcement, that enforcement is applied to all hosts connected to that port, regardless of the host's current state." ― FortiNAC-F Administration Guide: Port Group Enforcement and Ranking.

Question#3

Refer to the exhibits.






Based on the given configurations and settings, on which date and time would a guest account created at 8:00 AM on 2025/09/12 expire?

A. 2025/09/12 at 8:00 PM
B. 2025/09/12 at 7:00 PM
C. 2025/09/12 at 17:00:00
D. 2025/09/13 at 17:00:00

Explanation:
Questio ns no: 22
Verified Answer D
Comprehensive and Detailed 250 to 300 words each Explanation with Exact Matched Extract from FortiNAC-F Administrator library and documentation for current versions (including F 7.2, 7.4, and 7.6) documents:
In FortiNAC-F, the expiration of a guest or contractor account is determined by the configuration settings within the Account Creation Wizard and the associated Guest/Contractor Template. While a template can define a default "Account Duration" (as seen in the 12-hour setting in the second exhibit), the Account Creation Wizard allows an administrator to manually specify or override the start and end parameters for a specific user session.
According to the FortiNAC-F Administration Guide regarding guest management, the Account End Date field in the creation wizard is the definitive timestamp for when the account object will be disabled or deleted from the system. In the provided exhibit (Account Creation Wizard), the administrator has explicitly set the Account Start Date to 2025/09/12 08:00:00 and the Account End Date to 2025/09/13 17:00:00.
Even though the template indicates an "Account Duration" of 12 hours, this value typically serves as a pre-populated default. When a manual date and time are entered into the wizard, those specific values take precedence for that individual account. The account will remain active and valid until 5:00 PM (17:00:00) on the following day, 2025/09/13. It is also important to note the "Login Availability" from the template (8:00 AM - 7:00 PM); while the account exists until the 13th at 17:00:00, the user would only be able to authenticate during the active hours defined by the login schedule on both days.
"When creating an account, the administrator can select a template to provide default settings. However, specific values such as the Account End Date can be modified within the Account Creation Wizard. The date and time specified in the 'Account End Date' field determines the absolute expiration of the account. Once this time is reached, the account is moved to an expired state and the user's network access is revoked." ― FortiNAC-F Administration Guide: Guest and Contractor
Account Management.

Question#4

When configuring isolation networks in the configuration wizard, why does a layer 3 network typo allow for mora than ono DHCP scope for each isolation network typo?

A. The layer 3 network type allows for one scope for each possible host status.
B. Configuring more than one DHCP scope allows for DHCP server redundancy
C. There can be more than one isolation network of each type
D. Any scopes beyond the first scope are used if the initial scope runs out of IP addresses.

Explanation:
In FortiNAC-F, the Layer 3 Network type is specifically designed for deployments where the isolation networks―such as Registration, Remediation, and Dead End―are separated from the FortiNAC appliance's service interface (port2) by one or more routers. This architecture is common in large, distributed enterprise environments where endpoints in different physical locations or branches must be isolated into subnets that are local to their respective network equipment.
The reason the Configuration Wizard allows for more than one DHCP scope for a single isolation network type (state) is that there can be more than one isolation network of each type across the infrastructure. For instance, if an organization has three different sites, each site might require its own unique Layer 3 registration subnet to ensure efficient routing and to accommodate local IP address management. By allowing multiple scopes for the "Registration" state, FortiNAC can provide the appropriate IP address, gateway, and DNS settings to a rogue host regardless of which site's registration VLAN it is placed into.
When an endpoint is isolated, the network infrastructure (via DHCP Relay/IP Helper) directs the DHCP request to the FortiNAC service interface. FortiNAC then identifies which scope to use based on the incoming request's gateway information. This flexibility ensures that the system is not limited to a single flat subnet for each isolation state, supporting a scalable, multi-routed network topology.
"Multiple scopes are allowed for each isolation state (Registration, Remediation, Dead End, VPN, Authentication, Isolation, and Access Point Management). Within these scopes, multiple ranges in the lease pool are also permitted... This configWizard option is used when Isolation Networks are separated from the FortiNAC Appliance's port2 interface by a router." ― FortiNAC-F Configuration Wizard Reference Manual: Layer 3 Network Section.

Question#5

During an evaluation of state-based enforcement, an administrator discovers that ports that should not be under enforcement have been added to enforcement groups.
In which view would the administrator be able to identify who added the ports to the groups? (Selected)

A. The Admin Auditing view
B. The Event Management view
C. The Port Changes view
D. The Security Events view

Explanation:
In FortiNAC-F, accountability and forensic tracking of configuration changes are managed through the Admin Auditing functionality. When an administrator performs an action that modifies the system state―such as creating a policy, changing a device's status, or adding a switch port to an Enforcement Group―the system generates an audit record. This record is essential for troubleshooting scenarios where unauthorized or accidental configuration changes have occurred, leading to unintended network behavior.
The Admin Auditing view (found under Logs > Admin Auditing) provides a comprehensive log of the "Who, What, and When" for every administrative session. Each entry includes the username of the administrator, the source IP address from which they accessed the FortiNAC-F console, a precise timestamp, and a detailed description of the modification. In the scenario described, where ports have been incorrectly added to enforcement groups, the Admin Auditing view allows a supervisor to filter by the specific "Port" or "Group" object to identify exactly which administrator executed the command.
In contrast, the Event Management view (B) is designed to monitor system and network events, such as RADIUS authentications, host connections, and SNMP trap arrivals. While it tracks system activity, it does not typically log the manual configuration changes performed by admins. The Port Changes view (C) tracks the operational history of a port (such as VLAN assignment changes and host movements) but does not attribute the administrative assignment of the port to a group. Finally, the Security Events view (D) is dedicated to alerts triggered by security rules and external threat feeds.
"Admin Auditing displays a record of all modifications made to the FortiNAC-F system by an administrator. This view includes the administrator's name, the date and time of the change, and a description of the action taken. It is the primary resource for determining which administrative user performed a specific configuration change, such as modifying port group memberships or altering policy settings." ― FortiNAC-F Administration Guide: Logging and Auditing Section.

Disclaimer

This page is for educational and exam preparation reference only. It is not affiliated with Fortinet, FCP in Secure Networking, or the official exam provider. Candidates should refer to official documentation and training for authoritative information.

Exam Code: NSE5_FNC_AD_7.6Q & A: 32 Q&AsUpdated:  2026-01-07

  Get All NSE5_FNC_AD_7.6 Q&As