Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Forescout FSCP Forescout Certified Professional Exam Exam Practice Test

Page: 1 / 8
Total 80 questions

Forescout Certified Professional Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

What is the automated safety feature to prevent network wide outages/blocks?

Options:

A.

Stop all policies

B.

Disable policy

C.

Disable Policy Action

D.

Action Thresholds

E.

Send an Email Alert

Question 2

When creating a new "Send Mail" notification action, which email is used by default?

Options:

A.

The email configured under Options > General > Mail

B.

The email address of the last logged in user

C.

The Tech Support email

D.

The email that was used when registering the license

E.

The email entered in the send mail action on the rule

Question 3

Which of the following is a characteristic of a centralized deployment?

Options:

A.

Checking Microsoft vulnerabilities at remote site may have significant bandwidth impact

B.

Provides enhanced IPS and HTTP actions

C.

Is optimal for threat protection

D.

Deployed as a Layer-2 channel

E.

Every site has an appliance

Question 4

The host property 'HTTP User Agent banner' is resolved by what function?

Options:

A.

Device classification engine

B.

NetFlow

C.

NMAP scanning

D.

Packet engine

E.

Device profile library

Question 5

Which of the following is true regarding Failover Clustering module configuration?

Options:

A.

Once appliances are configured, then press the Apply button.

B.

Segments should be assigned to appliance folders and NOT to the individual appliances.

C.

You can see the status of failover by selecting IP Assignments and failover tab.

D.

Configure the second HA on the Secondary node.

E.

Place only the EM to participate in failover in the folder.

Question 6

How can scripts be run when the Endpoint Remote Inspection method is set to "Using MS-WMI"?

Options:

A.

Using Task Scheduler but this has limitations

B.

Using WMI, which will allow interactive scripts to run

C.

Using RRP, which will allow interactive scripts to run

D.

Using WMI, but they may not be run interactively using this method

E.

Using fsprocserv.exe, but scripts may not be run interactively using this method

Question 7

When using Remote Inspection for Windows, which of the following properties require fsprocsvc.exe interactive scripting?

Options:

A.

User Directory Common Name

B.

Update Microsoft Vulnerabilities

C.

Windows Expected Script Result

D.

Antivirus Running

E.

Windows Service Running

Question 8

Which of the following properties can be determined by the HPS Plugin? (Choose two)

Options:

A.

Application installed on Mac OS

B.

External Device on Windows

C.

Operating System

D.

AD group membership

E.

HTTP banner

Question 9

Which CLI command gathers historical statistics from the appliance and outputs the information to a single *.csv file for processing and analysis?

Options:

A.

fstool tech-support

B.

fstool appstats

C.

fstool va stats

D.

fstool stats

E.

fstool sysinfo stats

Question 10

How are additional recipients added to a "Send Mail" action?

Options:

A.

Thru the setting on Tools > Options > General > Mail and adding the recipients separated by commas

B.

Thru the policy "Send Mail" action, under the Parameters tab add the recipients separated by commas

C.

Thru Tools > Options > Advanced - Mail and adding the recipients separated by semi-colons

D.

Thru the Tools > Options > NAC Email and adding the recipients separated by semi-colons

E.

Thru the policy sub rule and adding a condition for each of the desired recipients

Question 11

Which of the following is the SMB protocol version required to manage Windows XP or Windows Vista endpoints?

Options:

A.

SMB V3.1.1

B.

SMB V1.0

C.

SMB is not required for XP or Vista

D.

SMB V2.0

E.

SMB V3.0

Question 12

When using MS-WMI for Remote inspection, which of the following properties should be used to test for Windows Manageability?

Options:

A.

Windows Manageable Domain (Current)

B.

MS-RRP Reachable

C.

MS-WMI Reachable

D.

MS-SMB Reachable

E.

Windows Manageable Domain

Question 13

When using the "Assign to VLAN action," why might it be useful to have a policy to record the original VLAN?

Select one:

Options:

A.

Since CounterACT reads the startup config to find the original VLAN, network administrators making changes to switch running configs could overwrite this VLAN information

B.

Since CounterACT reads the running config to find the original VLAN, network administrators saving configuration changes to switches could overwrite this VLAN information

C.

Since CounterACT reads the running config to find the original VLAN, network administrators making changes to switch running configs could overwrite this VLAN information

D.

Since CounterACT reads the running config to find the original VLAN, any changes to switch running configs could overwrite this VLAN information

E.

Since CounterACT reads the startup config to find the original VLAN, network administrators saving configuration changes to switches could overwrite this VLAN information

Question 14

Which of the following is true when setting up an Enterprise Manager as a High Availability Pair?

Options:

A.

If HA reboots, this is an indication of a problem.

B.

Set up HA on the Secondary node first.

C.

Connect devices to the network and to each other.

D.

HA needs to be manually configured on the secondary appliance in order to sync correctly.

E.

HA requires a license.

Question 15

Which of the following actions can be performed with Remote Inspection?

Options:

A.

Set Registry Key, Disable dual homing

B.

Send Balloon Notification, Send email to user

C.

Disable External Device, Start Windows Updates

D.

Start Secure Connector, Attempt to open a browser at the endpoint

E.

Endpoint Address ACL, Assign to VLAN

Question 16

Why would the patch delivery optimization mechanism used for Windows 10 updates be a potential security concern?

Options:

A.

It can be configured to use a peer-to-peer file sharing protocol

B.

CounterACT cannot initiate Windows updates for Windows 10 devices

C.

It uses a peer-to-peer file sharing protocol by default

D.

The registry DWORD controlling this behavior cannot be changed

E.

It always uses a peer-to-peer file sharing protocol

Question 17

Irresolvable hosts would match the condition. When configuring policies, which of the following statements is true regarding this image?

Select one:

Options:

A.

Has no effect on irresolvable hosts

B.

Generates a NOT condition in the sub-rule condition

C.

Negates the criteria outside the property

D.

Modifies the irresolvable condition to TRUE

Question 18

Which setting is NOT available when initially adding a server to the User Directory Plugin?

Options:

A.

Test

B.

Domain

C.

Domain Aliases

D.

Advanced

E.

Replica

Question 19

Where are the plugin logs located in the CounterACT CLI?

Options:

A.

/usr/local/forescout/plugin//log

B.

/usr/local/forescout/plugin/log/

C.

/usr/local/forescout/log

D.

/usr/local/log/plugin/

E.

/usr/local/forescout/log/plugin/

Question 20

Which field is NOT editable in the User Directory plugin once it is configured?

Options:

A.

Administrator

B.

Server Name

C.

Password

D.

Address

E.

Port

Question 21

Which of the following is a switch plugin property that can be used to identify endpoint connection location?

Options:

A.

Switch Location

B.

Switch Port Alias

C.

Switch IP/FQDN and Port Name

D.

Switch Port Action

E.

Wireless SSID

Question 22

Updates to the Device Profile Library may impact a device's classification if the device was classified using:

Options:

A.

Advanced Classification

B.

External Devices

C.

Client Certificates

D.

HTTP Banner

E.

Guest Registration

Question 23

When troubleshooting an issue that affects multiple endpoints, why might you choose to view Policy logs before Host logs?

Options:

A.

Because you can gather more pertinent information about a single host

B.

Because Policy logs show details for a range of endpoints

C.

You would not. Host logs are the best choice for a range of endpoints

D.

Policy logs may help to pinpoint the issue for a specific host

E.

Looking at Host logs is always the first step in the process

Question 24

Which of the following does NOT need to be checked when you are verifying correct switch plugin configuration?

Options:

A.

The Switch plugin is running

B.

Correct switch management credentials are configured for each switch

C.

IP address ranges are assigned to the correct appliance

D.

Each switch passes the plugin test

E.

Each switch is assigned to the correct appliance

Page: 1 / 8
Total 80 questions