Big Halloween Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Forescout FSCP Forescout Certified Professional Exam Exam Practice Test

Page: 1 / 8
Total 80 questions

Forescout Certified Professional Exam Questions and Answers

Question 1

How can scripts be run when the Endpoint Remote Inspection method is set to "Using MS-WMI"?

Options:

A.

Using Task Scheduler but this has limitations

B.

Using WMI, which will allow interactive scripts to run

C.

Using RRP, which will allow interactive scripts to run

D.

Using WMI, but they may not be run interactively using this method

E.

Using fsprocserv.exe, but scripts may not be run interactively using this method

Question 2

What is the command to monitor system memory and CPU load with 5 second update intervals?

Options:

A.

watch -t 5 vmstat

B.

vmstat 5

C.

vmstat -t 5

D.

watch uptime

E.

watch -n 10 vmstat

Question 3

Place the DNS Enforce control actions into the correct workflow order for endpoints which have a pending control action.

Question # 3

Options:

Question 4

Which of the following is the best way to brand the CounterACT HTTP pages to look like corporate internal web pages?

Options:

A.

Using the "Reports Portal," modify the CSS for the desired skins

B.

This is not possible with CounterACT portal and HTTP pages

C.

Using the "User Portal Builder," modify the CSS for the desired skins

D.

Have a webmaster modify the HTML pages within the Tomcat web server

E.

Using the "User Portal Builder" basic interface

Question 5

How are additional recipients added to a "Send Mail" action?

Options:

A.

Thru the setting on Tools > Options > General > Mail and adding the recipients separated by commas

B.

Thru the policy "Send Mail" action, under the Parameters tab add the recipients separated by commas

C.

Thru Tools > Options > Advanced - Mail and adding the recipients separated by semi-colons

D.

Thru the Tools > Options > NAC Email and adding the recipients separated by semi-colons

E.

Thru the policy sub rule and adding a condition for each of the desired recipients

Question 6

What Protocol does CounterACT use to verify the revocation status of certificates?

Options:

A.

PKI Certificate Revocation Protocol (PCRP)

B.

Online Certificate Status Protocol (OCSP)

C.

Online Revocation Status Protocol (ORSP)

D.

Certificate Revocation List Protocol (CRLP)

E.

Certificate Revocation Protocol (CRP)

Question 7

Which of the following is true regarding CounterACT 8 FLEXX Licensing?

Options:

A.

CounterACT 8 can be installed on all CTxx and 51xx models.

B.

Disaster Recovery is used for member appliances.

C.

For member appliances, HA and Failover Clustering are part of Resiliency licensing.

D.

Changing the licensing of the deployment from Per Appliance Licensing to FLEXX Licensing can be done through the Customer Portal.

E.

Failover Clustering is used with EM and RM.

Question 8

Which of the following are included in System backups?

Options:

A.

Switch Plugin version 8.7.0 and above

B.

Policies

C.

Hostname and IP address

D.

Failover Clustering plugin

E.

Wireless Plugin version 1.4.0 and above

Question 9

Updates to the Device Profile Library may impact a device's classification if the device was classified using:

Options:

A.

Advanced Classification

B.

External Devices

C.

Client Certificates

D.

HTTP Banner

E.

Guest Registration

Question 10

Which type of endpoint can be queried for registry key properties?

Options:

A.

Managed unknown endpoint

B.

Unmanaged Windows endpoint

C.

Managed Windows endpoint

D.

Windows endpoint

E.

Managed Linux endpoint

Question 11

Which of the following switch actions cannot both be used concurrently on the same switch?

Options:

A.

Access Port ACL & Switch Block

B.

Switch Block & Assign to VLAN

C.

Endpoint Address ACL & Assign to VLAN

D.

Access Port ACL & Endpoint Address ACL

E.

Access Port ACL & Assign to VLAN

Question 12

Which of the following actions can be performed with Remote Inspection?

Options:

A.

Set Registry Key, Disable dual homing

B.

Send Balloon Notification, Send email to user

C.

Disable External Device, Start Windows Updates

D.

Start Secure Connector, Attempt to open a browser at the endpoint

E.

Endpoint Address ACL, Assign to VLAN

Question 13

The host property 'HTTP User Agent banner' is resolved by what function?

Options:

A.

Device classification engine

B.

NetFlow

C.

NMAP scanning

D.

Packet engine

E.

Device profile library

Question 14

Which of the following must be configured in the User Directory plugin to allow active directory credentials to authenticate console logins?

Options:

A.

Include Parent groups

B.

Authentication

C.

Use as directory

D.

Target Group Resolution

E.

Use for console login

Question 15

Which type of signed SSL Certificate file formats are compatible with CounterACT?

Options:

A.

.Pfx/.p12, .Pfx/.p7

B.

.p7b, .pem

C.

.X.509, x.507

D.

.Pckcs#7, .pckcs#12

E.

.cer, .crt

Question 16

When using MS-WMI for Remote inspection, which of the following properties should be used to test for Windows Manageability?

Options:

A.

Windows Manageable Domain (Current)

B.

MS-RRP Reachable

C.

MS-WMI Reachable

D.

MS-SMB Reachable

E.

Windows Manageable Domain

Question 17

Which of the following are true about the comments field of the CounterACT database? (Choose two)

Options:

A.

Endpoints may have multiple comments assigned to them

B.

It cannot be edited manually by a right click administrator action, it can only be edited in policy by using the action "Run Script on CounterACT"

C.

It can be edited manually by a right click administrator action, or it can be edited in policy by using the action "Run Script on CounterACT"

D.

Endpoints may have exactly one comment assigned to them

E.

It can be edited manually by a right click administrator action, or it can be edited in policy by using the action "Run Script on Windows"

Question 18

Which field in the User Directory plugin should be configured for Active Directory subdomains?

Options:

A.

Replicas

B.

Address

C.

Parent Groups

D.

Domain Aliases

E.

DNS Detection

Question 19

When troubleshooting an issue that affects multiple endpoints, why might you choose to view Policy logs before Host logs?

Options:

A.

Because you can gather more pertinent information about a single host

B.

Because Policy logs show details for a range of endpoints

C.

You would not. Host logs are the best choice for a range of endpoints

D.

Policy logs may help to pinpoint the issue for a specific host

E.

Looking at Host logs is always the first step in the process

Question 20

Which of the following is true regarding the Windows Installed Programs property which employs the "for any/for all" logic mechanism?

Options:

A.

Although the condition has multiple sub-properties, when "ANY" is selected it evaluates the programs for any of the configured sub-properties.

B.

The condition does not have any sub-properties. The "any/all" refers to the multiple programs.

C.

Although the condition has sub-properties which could refer to a single program on multiple endpoints, the "any/all" refers to the program's properties.

D.

Although the condition has multiple sub-properties, the "any/all" refers to the sub-properties and not the programs.

E.

Although the condition has multiple sub-properties, the "any/all" refers to the programs and not the sub-properties.

Question 21

What best defines a 'Post-Connect Methodology'?

Options:

A.

802.1X is a flavor of Post-Connect

B.

Guilty until proven innocent

C.

Innocent until proven guilty

D.

Used subsequent to pre-connect

E.

Assessed for critical compliance before IP address is assigned

Question 22

Why is SMB required for Windows Manageability?

Options:

A.

Scripts run on CounterACT are copied to a temp directory and run locally on the endpoint

B.

Scripts run on endpoints are copied to a Linux script repository and run locally on the endpoint

C.

Scripts run on endpoints are copied to a temp directory and run remotely from CounterACT

D.

Scripts run on CounterACT are copied to a script repository and run remotely from CounterACT

E.

Scripts run on endpoints are copied to a temp directory and run locally on the endpoint

Question 23

When using Remote Inspection for Windows, which of the following properties require fsprocsvc.exe interactive scripting?

Options:

A.

User Directory Common Name

B.

Update Microsoft Vulnerabilities

C.

Windows Expected Script Result

D.

Antivirus Running

E.

Windows Service Running

Question 24

Select the action that requires symmetrical traffic.

Options:

A.

Assign to VLAN

B.

WLAN block

C.

Endpoint ACL

D.

Start SecureConnector

E.

Virtual Firewall

Page: 1 / 8
Total 80 questions