An administrator installs FortiClient EMS in the enterprise. Which component is responsible for enforcing endpoint protection in managed mode?
A. FortiClient
B. FortiClient vulnerability scan
C. FortiClient EMS
D. FortiClient EMS database
An administrator deploys a FortiClient installation through the Microsoft AD group policy After installation is
complete all the custom configuration is missing.
What could have caused this problem?
A. The FortiClient exe file is included in the distribution package
B. The FortiClient MST file is missing from the distribution package
C. FortiClient does not have permission to access the distribution package.
D. The FortiClient package is not assigned to the group
What does FortiClient do as a fabric agent? (Choose two )
A. Provides application inventory
B. Provides IOC verdicts
C. Automates Responses
D. Creates dynamic policies
Which three features does FortiClient endpoint security include? (Choose three )
A. L2TP
B. Real-time protection
C. DLP
D. Vulnerability management
E. IPsec
An administrator is required to maintain a software inventory on the endpoints. without showing the feature on the FortiClient dashboard What must the administrator do to achieve this requirement?
A. The administrator must use default endpoint profile
B. The administrator must not select the vulnerability scan feature in the deployment package.
C. The administrator must select the vulnerability scan feature in the deployment package, but disable the feature on the endpoint profile
D. The administrator must click the hide icon on the vulnerability scan tab
Refer to the exhibit.
Based on the settings shown in the exhibit which statement about FortiClient behavior is true?
A. FortiClient quarantines infected files and reviews later, after scanning them.
B. FortiClient blocks and deletes infected files after scanning them.
C. FortiClient scans infected files when the user copies files to the Resources folder
D. FortiClient copies infected files to the Resources folder without scanning them.
Refer to the exhibit.
Based on the FortiClient logs shown in the exhibit which application is blocked by the application firewall?
A. Twitter
B. Facebook
C. Internet Explorer
D. Firefox
An administrator installs FortiClient on Windows Server. What is the default behavior of real-time protection control?
A. Real-time protection must update AV signature database
B. Real-time protection sends malicious files to FortiSandbox when the file is not detected locally
C. Real-time protection is disabled
D. Real-time protection must update the signature database from FortiSandbox
Which network component sends a notification after identifying a connected endpoint in the quarantine automation process?
A. FortiGate
B. FortiClient
C. FortiClient EMS
D. FortiAnalyzer
Which three types of antivirus scans are available on FortiClient? (Choose three )
A. Proxy scan
B. Full scan
C. Custom scan
D. Flow scan
E. Quick scan