1.
Which of the following is NOT a valid option for the user type
when adding a user profile?
Select one:
o Group external user directory
o Single external user directory
o Single external RADIUS
o Single password
o Single smart card
2. Which feature prevents Forescout from using resources such
as Nmap and OS Fingerprint scans to learn device properties?
Select one:
o IoT Posture Assessment Engine
o Ignored IPs
o Properties-Passive Learning
o Threat Protection Legitimate Scan addresses
o HPS fsprocsvc
3. What is required to achieve agentless management of a
Windows host?
Select one:
o port 445, 1300, RPC
o port 445 or 139, RDP, Remote Registry, C$ admin share
o port 445 or 139, RPC, Remote Registry, C$ admin share
o port 443, 13000, RPC, RDP, Remote Registry
o port 443, 139, RPC, DNS
4. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
o Switch ACL Integration
o Router Integration
o Switch SNMP Integration
o Host Manageability
o Mirrored/SPAN Traffic
5. Which type of Assess policy has high potential bandwidth
impact?
Select one:
o Restricting Peer-to-Peer
o Pushing Windows Patches from Forescout
o Enabling Anti-virus
o Activating Classification Policy
o Invoking Threat Protection
6. Which of the following does NOT represent one of the elements
of a policy structure?
Select one:
o Policy conditions
o Policy actions
o A unique policy name
o History
o A policy scope
7. Which feature can be populated through both Options >
Discovery Rules and through targeted policies?
Select one:
o Group Manager
o Threat Protection Results panel
o Advanced Tools
o Policy Results panel
o Asset Inventory Tab
8. How can you show only active endpoints in the information
pane?
Select one:
o Select “Filter by online host”
o Add an active endpoint column
o Filter by “internal” option
o Deselect “inactive” option
o Select “Show only unassigned”
9. Which of the following is NOT required for the HPS Plugin to be
functional for Windows endpoint manageability?
Select one or more:
o File and printer sharing must be enabled.
o The C$ share must be present.
o NTLMv2 authentication must be disabled.
o SMB signing must be enabled on the endpoints
o The Domain service account must be a member of the Local
Administrators group.
10. Which of the following is NOT a Remediate action?
Select one:
o Assign to VLAN
o Set Registry Key on Windows
o Kill Process
o Start/Update Antivirus
o Kill Instant Messaging on Windows
11. Which of the following is a valid SecureConnector
deployment method? (Choose two)
Select one or more:
o Permanent as an Application
o Transient
o Removable
o Permanent as a Service
o Dissolvable
12. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
o Switch ACL Integration
o Router Integration
o Switch SNMP Integration
o Host Manageability
o Mirrored/SPAN Traffic
13. Which of the following does NOT display information
about the host device’s properties?
Select one:
o Device manager
o Host details panel
o Asset inventory
14. What is a prerequisite for sub-rule evaluation for an
endpoint by a policy with sub-rules?
Select one:
o The first sub-rule must look for compliant conditions on the
endpoint
o The main rule must have an action to trigger sub-rules
o The endpoint must match the main rule conditions and scope
o The endpoint must match at least one main rule condition
o The scope must have a group filter applied
15. Which of the following is NOT a valid option for the user
type when adding a user profile?
Select one:
o Group external user directory
o Single external user directory
o Single external RADIUS
o Single password
o Single smart card
16. Which of the following is NOT displayed by the Setup
Summary section of the initial command line installation?
Select one:
o DNS server
o NTP server
o (T)est to verify the default gateway and DNS
o Appliance host name
o IP Mask and Default Gateway for Management Interface
17. Which feature provides an attribute-based perspective of
your network resources rather than an endpoint-based view?
Select one:
o Dashboards
o User Directory plugin
o Policy Manager Tab
o Asset Inventory Tab
o Reports Portal
18. Which of the following is required for the HPS Plugin to
be functional for Windows endpoint manageability?
Select one:
o File and printer sharing must be enabled.
o The C$ share must be present.
o NTLMv2 authentication must be disabled.
o SMB signing must be enabled on the endpoints
o The Domain service account must be a member of the Local
Administrators group.
19. Which type of Assess policy has high potential bandwidth
impact?
Select one:
o Restricting Peer-to-Peer
o Pushing Windows Patches from Forescout
o Enabling Anti-virus
o Activating Classification Policy
o Invoking Threat Protection
20. Which of the following does NOT represent one of the
elements of a policy structure?
Select one:
o Policy conditions
o Policy actions
o A unique policy name
o History
o A policy scope
Here are the next set of questions, continuing from the previous ones:
21. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
o Switch ACL Integration
o Router Integration
o Switch SNMP Integration
o Host Manageability
o Mirrored/SPAN Traffic
22. Which of the following does NOT represent one of the
elements of a policy structure?
Select one:
o Policy conditions
o Policy actions
o A unique policy name
o History
o A policy scope
23. Which feature can be populated through both Options >
Discovery Rules and through targeted policies?
Select one:
o Group Manager
o Threat Protection Results panel
o Advanced Tools
o Policy Results panel
o Asset Inventory Tab
24. How can you show only active endpoints in the
information pane?
Select one:
o Select “Filter by online host”
o Add an active endpoint column
o Filter by “internal” option
o Deselect “inactive” option
o Select “Show only unassigned”
25. Which of the following is NOT required for the HPS Plugin
to be functional for Windows endpoint manageability?
Select one or more:
o File and printer sharing must be enabled.
o The C$ share must be present.
o NTLMv2 authentication must be disabled.
o SMB signing must be enabled on the endpoints
o The Domain service account must be a member of the Local
Administrators group.
26. Which of the following is NOT a Remediate action?
Select one:
o Assign to VLAN
o Set Registry Key on Windows
o Kill Process
o Start/Update Antivirus
o Kill Instant Messaging on Windows
27. Which of the following is a valid SecureConnector
deployment method? (Choose two)
Select one or more:
o Permanent as an Application
o Transient
o Removable
o Permanent as a Service
o Dissolvable
28. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
o Switch ACL Integration
o Router Integration
o Switch SNMP Integration
o Host Manageability
o Mirrored/SPAN Traffic
29. Which of the following does NOT display information
about the host device’s properties?
Select one:
o Device manager
o Host details panel
o Asset inventory
30. What is a prerequisite for sub-rule evaluation for an
endpoint by a policy with sub-rules?
Select one:
o The first sub-rule must look for compliant conditions on the
endpoint
o The main rule must have an action to trigger sub-rules
o The endpoint must match the main rule conditions and scope
o The endpoint must match at least one main rule condition
o The scope must have a group filter applied
31. Which of the following is NOT required for the HPS Plugin
to be functional for Windows endpoint manageability?
Select one:
File and printer sharing must be enabled.
The C$ share must be present.
NTLMv2 authentication must be disabled.
SMB signing must be enabled on the endpoints.
The Domain service account must be a member of the Local
Administrators group.
32. Which of the following is a valid SecureConnector
deployment method? (Choose two)
Select one or more:
Permanent as an Application
Transient
Removable
Permanent as a Service
Dissolvable
33. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
Switch ACL Integration
Router Integration
Switch SNMP Integration
Host Manageability
Mirrored/SPAN Traffic
34. Which of the following does NOT display information
about the host device’s properties?
Select one:
Device manager
Host details panel
Asset inventory
35. What is a prerequisite for sub-rule evaluation for an
endpoint by a policy with sub-rules?
Select one:
The first sub-rule must look for compliant conditions on the endpoint
The main rule must have an action to trigger sub-rules
The endpoint must match the main rule conditions and scope
The endpoint must match at least one main rule condition
The scope must have a group filter applied
36. Which feature provides an attribute-based perspective of
your network resources rather than an endpoint-based view?
Select one:
Dashboards
User Directory plugin
Policy Manager Tab
Asset Inventory Tab
Reports Portal
37. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
Switch ACL Integration
Router Integration
Switch SNMP Integration
Host Manageability
Mirrored/SPAN Traffic
38. Which of the following is NOT a valid option for the user
type when adding a user profile?
Select one:
Group external user directory
Single external user directory
Single external RADIUS
Single password
Single smart card
39. Which of the following is a valid method for endpoint
management in Forescout?
Select one:
SecureConnector
WMI
SSH
RDP
All of the above
40. What type of Assess policy has the highest potential
bandwidth impact?
Select one:
Restricting Peer-to-Peer
Pushing Windows Patches from Forescout
Enabling Anti-virus
Activating Classification Policy
Invoking Threat Protection
41. Which of the following is NOT required for the HPS Plugin
to be functional for Windows endpoint manageability?
Select one or more:
File and printer sharing must be enabled.
The C$ share must be present.
NTLMv2 authentication must be disabled.
SMB signing must be enabled on the endpoints.
The Domain service account must be a member of the Local
Administrators group.
42. Which of the following is a valid SecureConnector
deployment method? (Choose two)
Select one or more:
Permanent as an Application
Transient
Removable
Permanent as a Service
Dissolvable
43. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
Switch ACL Integration
Router Integration
Switch SNMP Integration
Host Manageability
Mirrored/SPAN Traffic
44. Which of the following does NOT display information
about the host device’s properties?
Select one:
Device manager
Host details panel
Asset inventory
45. What is a prerequisite for sub-rule evaluation for an
endpoint by a policy with sub-rules?
Select one:
The first sub-rule must look for compliant conditions on the endpoint
The main rule must have an action to trigger sub-rules
The endpoint must match the main rule conditions and scope
The endpoint must match at least one main rule condition
The scope must have a group filter applied
46. Which feature provides an attribute-based perspective of
your network resources rather than an endpoint-based view?
Select one:
Dashboards
User Directory plugin
Policy Manager Tab
Asset Inventory Tab
Reports Portal
47. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
Switch ACL Integration
Router Integration
Switch SNMP Integration
Host Manageability
Mirrored/SPAN Traffic
48. Which of the following is NOT a valid option for the user
type when adding a user profile?
Select one:
Group external user directory
Single external user directory
Single external RADIUS
Single password
Single smart card
49. Which of the following is a valid method for endpoint
management in Forescout?
Select one:
SecureConnector
WMI
SSH
RDP
All of the above
50. What type of Assess policy has the highest potential
bandwidth impact?
Select one:
Restricting Peer-to-Peer
Pushing Windows Patches from Forescout
Enabling Anti-virus
Activating Classification Policy
Invoking Threat Protection
51. Which of the following is NOT displayed by the Setup
Summary section of the initial command line installation?
Select one:
DNS server
NTP server
(T)est to verify the default gateway and DNS
Appliance host name
IP Mask and Default Gateway for Management Interface
52. Which feature provides an attribute-based perspective of
your network resources rather than an endpoint-based view?
Select one:
Dashboards
User Directory plugin
Policy Manager Tab
Asset Inventory Tab
Reports Portal
53. Which of the following is required for the HPS Plugin to
be functional for Windows endpoint manageability?
Select one:
File and printer sharing must be enabled.
The C$ share must be present.
NTLMv2 authentication must be disabled.
SMB signing must be enabled on the endpoints
The Domain service account must be a member of the Local
Administrators group.
54. Which type of Assess policy has high potential bandwidth
impact?
Select one:
Restricting Peer-to-Peer
Pushing Windows Patches from Forescout
Enabling Anti-virus
Activating Classification Policy
Invoking Threat Protection
55. Which of the following does NOT represent one of the
elements of a policy structure?
Select one:
Policy conditions
Policy actions
A unique policy name
History
A policy scope
56. Which feature can be populated through both Options >
Discovery Rules and through targeted policies?
Select one:
Group Manager
Threat Protection Results panel
Advanced Tools
Policy Results panel
Asset Inventory Tab
57. How can you show only active endpoints in the
information pane?
Select one:
Select “Filter by online host”
Add an active endpoint column
Filter by “internal” option
Deselect “inactive” option
Select “Show only unassigned”
58. Which of the following is NOT required for the HPS Plugin
to be functional for Windows endpoint manageability?
Select one or more:
File and printer sharing must be enabled.
The C$ share must be present.
NTLMv2 authentication must be disabled.
SMB signing must be enabled on the endpoints
The Domain service account must be a member of the Local
Administrators group.
59. Which of the following is NOT a Remediate action?
Select one:
Assign to VLAN
Set Registry Key on Windows
Kill Process
Start/Update Antivirus
Kill Instant Messaging on Windows
60. Which of the following is a valid SecureConnector
deployment method? (Choose two)
Select one or more:
Permanent as an Application
Transient
Removable
Permanent as a Service
Dissolvable
61. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
Switch ACL Integration
Router Integration
Switch SNMP Integration
Host Manageability
Mirrored/SPAN Traffic
62. Which of the following does NOT display information
about the host device’s properties?
Select one:
Device manager
Host details panel
Asset inventory
63. What is a prerequisite for sub-rule evaluation for an
endpoint by a policy with sub-rules?
Select one:
The first sub-rule must look for compliant conditions on the endpoint
The main rule must have an action to trigger sub-rules
The endpoint must match the main rule conditions and scope
The endpoint must match at least one main rule condition
The scope must have a group filter applied
64. Which feature provides an attribute-based perspective of
your network resources rather than an endpoint-based view?
Select one:
Dashboards
User Directory plugin
Policy Manager Tab
Asset Inventory Tab
Reports Portal
65. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
Switch ACL Integration
Router Integration
Switch SNMP Integration
Host Manageability
Mirrored/SPAN Traffic
66. Which of the following is NOT a valid option for the user
type when adding a user profile?
Select one:
Group external user directory
Single external user directory
Single external RADIUS
Single password
Single smart card
67. Which of the following is a valid method for endpoint
management in Forescout?
Select one:
SecureConnector
WMI
SSH
RDP
All of the above
68. What type of Assess policy has the highest potential
bandwidth impact?
Select one:
Restricting Peer-to-Peer
Pushing Windows Patches from Forescout
Enabling Anti-virus
Activating Classification Policy
Invoking Threat Protection
69. Which of the following is NOT displayed by the Setup
Summary section of the initial command line installation?
Select one:
DNS server
NTP server
(T)est to verify the default gateway and DNS
Appliance host name
IP Mask and Default Gateway for Management Interface
70. Which feature provides an attribute-based perspective of
your network resources rather than an endpoint-based view?
Select one:
Dashboards
User Directory plugin
Policy Manager Tab
Asset Inventory Tab
Reports Portal
71. Which of the following is required for the HPS Plugin to
be functional for Windows endpoint manageability?
Select one:
File and printer sharing must be enabled.
The C$ share must be present.
NTLMv2 authentication must be disabled.
SMB signing must be enabled on the endpoints.
The Domain service account must be a member of the Local
Administrators group.
72. Which type of Assess policy has high potential bandwidth
impact?
Select one:
Restricting Peer-to-Peer
Pushing Windows Patches from Forescout
Enabling Anti-virus
Activating Classification Policy
Invoking Threat Protection
73. Which of the following does NOT represent one of the
elements of a policy structure?
Select one:
Policy conditions
Policy actions
A unique policy name
History
A policy scope
74. Which feature can be populated through both Options >
Discovery Rules and through targeted policies?
Select one:
Group Manager
Threat Protection Results panel
Advanced Tools
Policy Results panel
Asset Inventory Tab
75. How can you show only active endpoints in the
information pane?
Select one:
Select “Filter by online host”
Add an active endpoint column
Filter by “internal” option
Deselect “inactive” option
Select “Show only unassigned”
76. Which of the following is NOT required for the HPS Plugin
to be functional for Windows endpoint manageability?
Select one or more:
File and printer sharing must be enabled.
The C$ share must be present.
NTLMv2 authentication must be disabled.
SMB signing must be enabled on the endpoints.
The Domain service account must be a member of the Local
Administrators group.
77. Which of the following is NOT a Remediate action?
Select one:
Assign to VLAN
Set Registry Key on Windows
Kill Process
Start/Update Antivirus
Kill Instant Messaging on Windows
78. Which of the following is a valid SecureConnector
deployment method? (Choose two)
Select one or more:
Permanent as an Application
Transient
Removable
Permanent as a Service
Dissolvable
79. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
Switch ACL Integration
Router Integration
Switch SNMP Integration
Host Manageability
Mirrored/SPAN Traffic
80. Which of the following does NOT display information
about the host device’s properties?
Select one:
Device manager
Host details panel
Asset inventory
Reports portal
Threat protection panel
Missed Questions:
1. Which of the following is NOT a valid option for the user type
when adding a user profile?
Select one:
o Group external user directory
o Single external user directory
o Single external RADIUS
o Single password
o Single smart card
2. Which feature prevents Forescout from using resources such
as Nmap and OS Fingerprint scans to learn device properties?
Select one:
o IoT Posture Assessment Engine
o Ignored IPs
o Properties-Passive Learning
o Threat Protection Legitimate Scan addresses
o HPS fsprocsvc
3. What is required to achieve agentless management of a
Windows host?
Select one:
o port 445, 1300, RPC
o port 445 or 139, RDP, Remote Registry, C$ admin share
o port 445 or 139, RPC, Remote Registry, C$ admin share
o port 443, 13000, RPC, RDP, Remote Registry
o port 443, 139, RPC, DNS