0% found this document useful (0 votes)
1K views17 pages

80 Questions Forescout

The document consists of a series of multiple-choice questions related to user profiles, network management, and security features in a system, likely pertaining to Forescout. It covers topics such as user types, endpoint management, policy structures, and various functionalities required for system operations. Each question provides options for the user to select the correct answer, indicating a quiz or assessment format.

Uploaded by

xfccfwnwp7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views17 pages

80 Questions Forescout

The document consists of a series of multiple-choice questions related to user profiles, network management, and security features in a system, likely pertaining to Forescout. It covers topics such as user types, endpoint management, policy structures, and various functionalities required for system operations. Each question provides options for the user to select the correct answer, indicating a quiz or assessment format.

Uploaded by

xfccfwnwp7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

1.

Which of the following is NOT a valid option for the user type
when adding a user profile?
Select one:
o Group external user directory
o Single external user directory
o Single external RADIUS
o Single password
o Single smart card

2. Which feature prevents Forescout from using resources such


as Nmap and OS Fingerprint scans to learn device properties?
Select one:
o IoT Posture Assessment Engine
o Ignored IPs
o Properties-Passive Learning
o Threat Protection Legitimate Scan addresses
o HPS fsprocsvc

3. What is required to achieve agentless management of a


Windows host?
Select one:
o port 445, 1300, RPC
o port 445 or 139, RDP, Remote Registry, C$ admin share
o port 445 or 139, RPC, Remote Registry, C$ admin share
o port 443, 13000, RPC, RDP, Remote Registry
o port 443, 139, RPC, DNS

4. Which of the following is required for the Virtual Firewall


action to function properly?
Select one:
o Switch ACL Integration
o Router Integration
o Switch SNMP Integration
o Host Manageability
o Mirrored/SPAN Traffic

5. Which type of Assess policy has high potential bandwidth


impact?
Select one:
o Restricting Peer-to-Peer
o Pushing Windows Patches from Forescout
o Enabling Anti-virus
o Activating Classification Policy
o Invoking Threat Protection
6. Which of the following does NOT represent one of the elements
of a policy structure?
Select one:
o Policy conditions
o Policy actions
o A unique policy name
o History
o A policy scope

7. Which feature can be populated through both Options >


Discovery Rules and through targeted policies?
Select one:
o Group Manager
o Threat Protection Results panel
o Advanced Tools
o Policy Results panel
o Asset Inventory Tab

8. How can you show only active endpoints in the information


pane?
Select one:
o Select “Filter by online host”
o Add an active endpoint column
o Filter by “internal” option
o Deselect “inactive” option
o Select “Show only unassigned”

9. Which of the following is NOT required for the HPS Plugin to be


functional for Windows endpoint manageability?
Select one or more:
o File and printer sharing must be enabled.
o The C$ share must be present.
o NTLMv2 authentication must be disabled.
o SMB signing must be enabled on the endpoints
o The Domain service account must be a member of the Local
Administrators group.

10. Which of the following is NOT a Remediate action?


Select one:
o Assign to VLAN
o Set Registry Key on Windows
o Kill Process
o Start/Update Antivirus
o Kill Instant Messaging on Windows
11. Which of the following is a valid SecureConnector
deployment method? (Choose two)
Select one or more:
o Permanent as an Application
o Transient
o Removable
o Permanent as a Service
o Dissolvable

12. Which of the following is required for the Virtual Firewall


action to function properly?
Select one:
o Switch ACL Integration
o Router Integration
o Switch SNMP Integration
o Host Manageability
o Mirrored/SPAN Traffic

13. Which of the following does NOT display information


about the host device’s properties?
Select one:
o Device manager
o Host details panel
o Asset inventory

14. What is a prerequisite for sub-rule evaluation for an


endpoint by a policy with sub-rules?
Select one:
o The first sub-rule must look for compliant conditions on the
endpoint
o The main rule must have an action to trigger sub-rules
o The endpoint must match the main rule conditions and scope
o The endpoint must match at least one main rule condition
o The scope must have a group filter applied

15. Which of the following is NOT a valid option for the user
type when adding a user profile?
Select one:
o Group external user directory
o Single external user directory
o Single external RADIUS
o Single password
o Single smart card
16. Which of the following is NOT displayed by the Setup
Summary section of the initial command line installation?
Select one:
o DNS server
o NTP server
o (T)est to verify the default gateway and DNS
o Appliance host name
o IP Mask and Default Gateway for Management Interface

17. Which feature provides an attribute-based perspective of


your network resources rather than an endpoint-based view?
Select one:
o Dashboards
o User Directory plugin
o Policy Manager Tab
o Asset Inventory Tab
o Reports Portal

18. Which of the following is required for the HPS Plugin to


be functional for Windows endpoint manageability?
Select one:
o File and printer sharing must be enabled.
o The C$ share must be present.
o NTLMv2 authentication must be disabled.
o SMB signing must be enabled on the endpoints
o The Domain service account must be a member of the Local
Administrators group.

19. Which type of Assess policy has high potential bandwidth


impact?
Select one:
o Restricting Peer-to-Peer
o Pushing Windows Patches from Forescout
o Enabling Anti-virus
o Activating Classification Policy
o Invoking Threat Protection

20. Which of the following does NOT represent one of the


elements of a policy structure?
Select one:
o Policy conditions
o Policy actions
o A unique policy name
o History
o A policy scope
Here are the next set of questions, continuing from the previous ones:

21. Which of the following is required for the Virtual Firewall


action to function properly?
Select one:
o Switch ACL Integration
o Router Integration
o Switch SNMP Integration
o Host Manageability
o Mirrored/SPAN Traffic

22. Which of the following does NOT represent one of the


elements of a policy structure?
Select one:
o Policy conditions
o Policy actions
o A unique policy name
o History
o A policy scope

23. Which feature can be populated through both Options >


Discovery Rules and through targeted policies?
Select one:
o Group Manager
o Threat Protection Results panel
o Advanced Tools
o Policy Results panel
o Asset Inventory Tab

24. How can you show only active endpoints in the


information pane?
Select one:
o Select “Filter by online host”
o Add an active endpoint column
o Filter by “internal” option
o Deselect “inactive” option
o Select “Show only unassigned”

25. Which of the following is NOT required for the HPS Plugin
to be functional for Windows endpoint manageability?
Select one or more:
o File and printer sharing must be enabled.
o The C$ share must be present.
o NTLMv2 authentication must be disabled.
o SMB signing must be enabled on the endpoints
o The Domain service account must be a member of the Local
Administrators group.

26. Which of the following is NOT a Remediate action?


Select one:
o Assign to VLAN
o Set Registry Key on Windows
o Kill Process
o Start/Update Antivirus
o Kill Instant Messaging on Windows

27. Which of the following is a valid SecureConnector


deployment method? (Choose two)
Select one or more:
o Permanent as an Application
o Transient
o Removable
o Permanent as a Service
o Dissolvable

28. Which of the following is required for the Virtual Firewall


action to function properly?
Select one:
o Switch ACL Integration
o Router Integration
o Switch SNMP Integration
o Host Manageability
o Mirrored/SPAN Traffic

29. Which of the following does NOT display information


about the host device’s properties?
Select one:
o Device manager
o Host details panel
o Asset inventory

30. What is a prerequisite for sub-rule evaluation for an


endpoint by a policy with sub-rules?
Select one:
o The first sub-rule must look for compliant conditions on the
endpoint
o The main rule must have an action to trigger sub-rules
o The endpoint must match the main rule conditions and scope
o The endpoint must match at least one main rule condition
o The scope must have a group filter applied
31. Which of the following is NOT required for the HPS Plugin
to be functional for Windows endpoint manageability?
Select one:
 File and printer sharing must be enabled.
 The C$ share must be present.
 NTLMv2 authentication must be disabled.
 SMB signing must be enabled on the endpoints.
 The Domain service account must be a member of the Local
Administrators group.

32. Which of the following is a valid SecureConnector


deployment method? (Choose two)
Select one or more:
 Permanent as an Application
 Transient
 Removable
 Permanent as a Service
 Dissolvable

33. Which of the following is required for the Virtual Firewall


action to function properly?
Select one:
 Switch ACL Integration
 Router Integration
 Switch SNMP Integration
 Host Manageability
 Mirrored/SPAN Traffic

34. Which of the following does NOT display information


about the host device’s properties?
Select one:
 Device manager
 Host details panel
 Asset inventory

35. What is a prerequisite for sub-rule evaluation for an


endpoint by a policy with sub-rules?
Select one:
 The first sub-rule must look for compliant conditions on the endpoint
 The main rule must have an action to trigger sub-rules
 The endpoint must match the main rule conditions and scope
 The endpoint must match at least one main rule condition
 The scope must have a group filter applied
36. Which feature provides an attribute-based perspective of
your network resources rather than an endpoint-based view?
Select one:
 Dashboards
 User Directory plugin
 Policy Manager Tab
 Asset Inventory Tab
 Reports Portal

37. Which of the following is required for the Virtual Firewall


action to function properly?
Select one:
 Switch ACL Integration
 Router Integration
 Switch SNMP Integration
 Host Manageability
 Mirrored/SPAN Traffic

38. Which of the following is NOT a valid option for the user
type when adding a user profile?
Select one:
 Group external user directory
 Single external user directory
 Single external RADIUS
 Single password
 Single smart card

39. Which of the following is a valid method for endpoint


management in Forescout?
Select one:
 SecureConnector
 WMI
 SSH
 RDP
 All of the above

40. What type of Assess policy has the highest potential


bandwidth impact?
Select one:
 Restricting Peer-to-Peer
 Pushing Windows Patches from Forescout
 Enabling Anti-virus
 Activating Classification Policy
 Invoking Threat Protection
41. Which of the following is NOT required for the HPS Plugin
to be functional for Windows endpoint manageability?
Select one or more:
 File and printer sharing must be enabled.
 The C$ share must be present.
 NTLMv2 authentication must be disabled.
 SMB signing must be enabled on the endpoints.
 The Domain service account must be a member of the Local
Administrators group.

42. Which of the following is a valid SecureConnector


deployment method? (Choose two)
Select one or more:
 Permanent as an Application
 Transient
 Removable
 Permanent as a Service
 Dissolvable

43. Which of the following is required for the Virtual Firewall


action to function properly?
Select one:
 Switch ACL Integration
 Router Integration
 Switch SNMP Integration
 Host Manageability
 Mirrored/SPAN Traffic

44. Which of the following does NOT display information


about the host device’s properties?
Select one:
 Device manager
 Host details panel
 Asset inventory

45. What is a prerequisite for sub-rule evaluation for an


endpoint by a policy with sub-rules?
Select one:
 The first sub-rule must look for compliant conditions on the endpoint
 The main rule must have an action to trigger sub-rules
 The endpoint must match the main rule conditions and scope
 The endpoint must match at least one main rule condition
 The scope must have a group filter applied
46. Which feature provides an attribute-based perspective of
your network resources rather than an endpoint-based view?
Select one:
 Dashboards
 User Directory plugin
 Policy Manager Tab
 Asset Inventory Tab
 Reports Portal

47. Which of the following is required for the Virtual Firewall


action to function properly?
Select one:
 Switch ACL Integration
 Router Integration
 Switch SNMP Integration
 Host Manageability
 Mirrored/SPAN Traffic

48. Which of the following is NOT a valid option for the user
type when adding a user profile?
Select one:
 Group external user directory
 Single external user directory
 Single external RADIUS
 Single password
 Single smart card

49. Which of the following is a valid method for endpoint


management in Forescout?
Select one:
 SecureConnector
 WMI
 SSH
 RDP
 All of the above

50. What type of Assess policy has the highest potential


bandwidth impact?
Select one:
 Restricting Peer-to-Peer
 Pushing Windows Patches from Forescout
 Enabling Anti-virus
 Activating Classification Policy
 Invoking Threat Protection
51. Which of the following is NOT displayed by the Setup
Summary section of the initial command line installation?
Select one:
 DNS server
 NTP server
 (T)est to verify the default gateway and DNS
 Appliance host name
 IP Mask and Default Gateway for Management Interface

52. Which feature provides an attribute-based perspective of


your network resources rather than an endpoint-based view?
Select one:
 Dashboards
 User Directory plugin
 Policy Manager Tab
 Asset Inventory Tab
 Reports Portal

53. Which of the following is required for the HPS Plugin to


be functional for Windows endpoint manageability?
Select one:
 File and printer sharing must be enabled.
 The C$ share must be present.
 NTLMv2 authentication must be disabled.
 SMB signing must be enabled on the endpoints
 The Domain service account must be a member of the Local
Administrators group.

54. Which type of Assess policy has high potential bandwidth


impact?
Select one:
 Restricting Peer-to-Peer
 Pushing Windows Patches from Forescout
 Enabling Anti-virus
 Activating Classification Policy
 Invoking Threat Protection

55. Which of the following does NOT represent one of the


elements of a policy structure?
Select one:
 Policy conditions
 Policy actions
 A unique policy name
 History
 A policy scope
56. Which feature can be populated through both Options >
Discovery Rules and through targeted policies?
Select one:
 Group Manager
 Threat Protection Results panel
 Advanced Tools
 Policy Results panel
 Asset Inventory Tab

57. How can you show only active endpoints in the


information pane?
Select one:
 Select “Filter by online host”
 Add an active endpoint column
 Filter by “internal” option
 Deselect “inactive” option
 Select “Show only unassigned”

58. Which of the following is NOT required for the HPS Plugin
to be functional for Windows endpoint manageability?
Select one or more:
 File and printer sharing must be enabled.
 The C$ share must be present.
 NTLMv2 authentication must be disabled.
 SMB signing must be enabled on the endpoints
 The Domain service account must be a member of the Local
Administrators group.

59. Which of the following is NOT a Remediate action?


Select one:
 Assign to VLAN
 Set Registry Key on Windows
 Kill Process
 Start/Update Antivirus
 Kill Instant Messaging on Windows

60. Which of the following is a valid SecureConnector


deployment method? (Choose two)
Select one or more:
 Permanent as an Application
 Transient
 Removable
 Permanent as a Service
 Dissolvable
61. Which of the following is required for the Virtual Firewall
action to function properly?
Select one:
 Switch ACL Integration
 Router Integration
 Switch SNMP Integration
 Host Manageability
 Mirrored/SPAN Traffic

62. Which of the following does NOT display information


about the host device’s properties?
Select one:
 Device manager
 Host details panel
 Asset inventory

63. What is a prerequisite for sub-rule evaluation for an


endpoint by a policy with sub-rules?
Select one:
 The first sub-rule must look for compliant conditions on the endpoint
 The main rule must have an action to trigger sub-rules
 The endpoint must match the main rule conditions and scope
 The endpoint must match at least one main rule condition
 The scope must have a group filter applied

64. Which feature provides an attribute-based perspective of


your network resources rather than an endpoint-based view?
Select one:
 Dashboards
 User Directory plugin
 Policy Manager Tab
 Asset Inventory Tab
 Reports Portal

65. Which of the following is required for the Virtual Firewall


action to function properly?
Select one:
 Switch ACL Integration
 Router Integration
 Switch SNMP Integration
 Host Manageability
 Mirrored/SPAN Traffic

66. Which of the following is NOT a valid option for the user
type when adding a user profile?
Select one:
 Group external user directory
 Single external user directory
 Single external RADIUS
 Single password
 Single smart card

67. Which of the following is a valid method for endpoint


management in Forescout?
Select one:
 SecureConnector
 WMI
 SSH
 RDP
 All of the above

68. What type of Assess policy has the highest potential


bandwidth impact?
Select one:
 Restricting Peer-to-Peer
 Pushing Windows Patches from Forescout
 Enabling Anti-virus
 Activating Classification Policy
 Invoking Threat Protection

69. Which of the following is NOT displayed by the Setup


Summary section of the initial command line installation?
Select one:
 DNS server
 NTP server
 (T)est to verify the default gateway and DNS
 Appliance host name
 IP Mask and Default Gateway for Management Interface

70. Which feature provides an attribute-based perspective of


your network resources rather than an endpoint-based view?
Select one:
 Dashboards
 User Directory plugin
 Policy Manager Tab
 Asset Inventory Tab
 Reports Portal

71. Which of the following is required for the HPS Plugin to


be functional for Windows endpoint manageability?
Select one:
 File and printer sharing must be enabled.
 The C$ share must be present.
 NTLMv2 authentication must be disabled.
 SMB signing must be enabled on the endpoints.
 The Domain service account must be a member of the Local
Administrators group.

72. Which type of Assess policy has high potential bandwidth


impact?
Select one:
 Restricting Peer-to-Peer
 Pushing Windows Patches from Forescout
 Enabling Anti-virus
 Activating Classification Policy
 Invoking Threat Protection

73. Which of the following does NOT represent one of the


elements of a policy structure?
Select one:
 Policy conditions
 Policy actions
 A unique policy name
 History
 A policy scope

74. Which feature can be populated through both Options >


Discovery Rules and through targeted policies?
Select one:
 Group Manager
 Threat Protection Results panel
 Advanced Tools
 Policy Results panel
 Asset Inventory Tab

75. How can you show only active endpoints in the


information pane?
Select one:
 Select “Filter by online host”
 Add an active endpoint column
 Filter by “internal” option
 Deselect “inactive” option
 Select “Show only unassigned”

76. Which of the following is NOT required for the HPS Plugin
to be functional for Windows endpoint manageability?
Select one or more:
 File and printer sharing must be enabled.
 The C$ share must be present.
 NTLMv2 authentication must be disabled.
 SMB signing must be enabled on the endpoints.
 The Domain service account must be a member of the Local
Administrators group.

77. Which of the following is NOT a Remediate action?


Select one:
 Assign to VLAN
 Set Registry Key on Windows
 Kill Process
 Start/Update Antivirus
 Kill Instant Messaging on Windows

78. Which of the following is a valid SecureConnector


deployment method? (Choose two)
Select one or more:
 Permanent as an Application
 Transient
 Removable
 Permanent as a Service
 Dissolvable

79. Which of the following is required for the Virtual Firewall


action to function properly?
Select one:
 Switch ACL Integration
 Router Integration
 Switch SNMP Integration
 Host Manageability
 Mirrored/SPAN Traffic

80. Which of the following does NOT display information


about the host device’s properties?
Select one:
 Device manager
 Host details panel
 Asset inventory
 Reports portal
 Threat protection panel

Missed Questions:
1. Which of the following is NOT a valid option for the user type
when adding a user profile?
Select one:
o Group external user directory
o Single external user directory
o Single external RADIUS
o Single password
o Single smart card

2. Which feature prevents Forescout from using resources such


as Nmap and OS Fingerprint scans to learn device properties?
Select one:
o IoT Posture Assessment Engine
o Ignored IPs
o Properties-Passive Learning
o Threat Protection Legitimate Scan addresses
o HPS fsprocsvc

3. What is required to achieve agentless management of a


Windows host?
Select one:
o port 445, 1300, RPC
o port 445 or 139, RDP, Remote Registry, C$ admin share
o port 445 or 139, RPC, Remote Registry, C$ admin share
o port 443, 13000, RPC, RDP, Remote Registry
o port 443, 139, RPC, DNS

You might also like