New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet NSE6_FNC-7.2 Exam - Topic 8 Question 28 Discussion

Actual exam question for Fortinet's NSE6_FNC-7.2 exam
Question #: 28
Topic #: 8
[All NSE6_FNC-7.2 Questions]

With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?

Show Suggested Answer Hide Answer
Suggested Answer: D

Open Windows PowerShell or a command prompt. Run the following command to determine if you already have WinRM over HTTPS configured.


Admin Guide on p. 362, 'Matches if the device successfully responds to a WinRM client session request. User name and password credentials are required. If there are multiple credentials, each set of credentials will be attempted to find a potential match. The commands are used to automate interaction with the device. Each command is run via Powershell.'

Contribute your Thoughts:

0/2000 characters
Jame
3 months ago
I agree, isolation makes the most sense here.
upvoted 0 times
...
Gianna
3 months ago
Definitely option C, isolation is key for at-risk hosts.
upvoted 0 times
...
Alaine
3 months ago
Wait, are we sure about that? Sounds off to me.
upvoted 0 times
...
Reiko
4 months ago
Nah, it should follow the network access policy instead.
upvoted 0 times
...
Thurman
4 months ago
I'm pretty sure the host gets isolated.
upvoted 0 times
...
Martha
4 months ago
I’m leaning towards the host being administratively disabled, but I need to double-check how "at risk" impacts the enforcement of policies.
upvoted 0 times
...
Dudley
4 months ago
I feel like the right answer could be that the host is isolated, but I also wonder if it could just be provisioned with limited access instead.
upvoted 0 times
...
Gertude
4 months ago
I remember a practice question where a similar scenario had the host provisioned based on the policy, but I can't recall the specifics.
upvoted 0 times
...
Sherman
5 months ago
I think if a host is "at risk," it might get isolated, but I'm not completely sure.
upvoted 0 times
...
Eliz
5 months ago
This is a great question that really tests our knowledge of network access control. I think the key here is to understand how the "at-risk" host state interacts with the network access policy. I'm pretty confident that the correct answer is option B.
upvoted 0 times
...
Norah
5 months ago
I'm a bit confused by this question. The wording is a bit ambiguous, and I'm not sure if I fully understand the relationship between network access policies and the "at-risk" host state. I'll need to review my notes and think it through carefully.
upvoted 0 times
...
Svetlana
5 months ago
Okay, I've got a good feeling about this one. Based on my understanding of network access policies, I believe the host will be provisioned based on the network access policy if it matches and is in an "at-risk" state.
upvoted 0 times
...
Lino
5 months ago
Hmm, this seems like a tricky one. I'm not entirely sure about the correct answer, but I'll try to reason through the options and see if I can eliminate any that don't make sense.
upvoted 0 times
...
Lamonica
5 months ago
I think this question is testing our understanding of network access policies and how they interact with the "at-risk" host state. I'll need to carefully consider the implications of each option.
upvoted 0 times
...
Effie
9 months ago
Wait, is the host supposed to get a promotion to 'network access policy' if it's at-risk? That's like rewarding bad behavior!
upvoted 0 times
...
Ocie
9 months ago
I'm going with B. Isolating the host seems a bit extreme, and disabling it entirely doesn't make much sense with 'access policies' in the question.
upvoted 0 times
Ling
9 months ago
Yeah, disabling the host completely doesn't align with the idea of access policies. B is the most logical choice.
upvoted 0 times
...
Rueben
9 months ago
Agreed, isolating the host does seem extreme. It's better to stick with the defined policy.
upvoted 0 times
...
Kristeen
9 months ago
I think B is the correct answer too. It makes sense to provision based on the network access policy.
upvoted 0 times
...
...
Michell
10 months ago
D has to be the right answer. Why else would they ask about at-risk hosts if not to disable them administratively?
upvoted 0 times
Erasmo
8 months ago
C) The host is isolated.
upvoted 0 times
...
Isaac
9 months ago
B) The host is provisioned based on the network access policy.
upvoted 0 times
...
Laurene
9 months ago
A) The host is provisioned based on the default access defined by the point of connection.
upvoted 0 times
...
...
Valene
10 months ago
C seems like the correct answer to me. If the host is at-risk, it should be isolated to prevent further damage.
upvoted 0 times
Gerald
9 months ago
It's important to take action quickly when a host is at-risk to minimize the impact on the network.
upvoted 0 times
...
Annice
9 months ago
I agree, isolating the host will prevent any potential threats from spreading.
upvoted 0 times
...
Ma
10 months ago
I think C is the correct answer too. Isolating the at-risk host is the best way to protect the network.
upvoted 0 times
...
...
Ronny
10 months ago
I think the answer is B. The host should be provisioned based on the network access policy since that's the whole point of having it enabled.
upvoted 0 times
Stephane
10 months ago
Yes, that's correct. The host will be provisioned based on the network access policy.
upvoted 0 times
...
Stephane
10 months ago
I agree, the host should be provisioned based on the network access policy.
upvoted 0 times
...
...
Lai
11 months ago
That could make sense too, as it would ensure the host follows the specified policy.
upvoted 0 times
...
Elouise
11 months ago
I disagree, I believe the host will be provisioned based on the network access policy.
upvoted 0 times
...
Lai
11 months ago
I think if a host matches a network access policy and is 'at risk', it will be isolated.
upvoted 0 times
...

Save Cancel