0% found this document useful (0 votes)
357 views27 pages

Ujian ForeScout FSCA

Uploaded by

indramulyadi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
357 views27 pages

Ujian ForeScout FSCA

Uploaded by

indramulyadi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

The Enterprise Discover policy uses what property to identify Networking Equipment?

Select one:

Function

Open port 80/HTTP

DNS name

Session as Client

Access IP

Which of the following is NOT displayed by the Setup Summary section of the initial
command line installation?
Select one:

DNS server

NTP server

IP Mask and Default Gateway for Management Interface

Appliance host name

(T)est to verify the default gateway and DNS

Which one of the following will cause errors when using the Linux plugin to enable Remote
Inspection on endpoints?
Select one:

The admin service account configured in the Linux plugin has not been created on every
endpoint to be managed.

Forescout’s public SSH key was added to the “authorized_keys” file on the endpoints.

The “Enable remote inspection” check box is selected in the Linux plugin.

The network infrastructure is not blocking TCP/22 between Forescout and the managed
endpoints.

The SSH server is installed and running on the endpoints to be managed.


What is the default port used to manage a member appliance from an Enterprise Manager?
Select one:

UDP 69

TCP 13000

TCP 52311

TCP 443

UDP 61

Forescout operations are described as See, Control, and Orchestrate. What are the policy
families that fall within “SEE”? (Choose two)
Select one or more:

Assess

Restrict

Port Block

Notify

Discover

ACL blocking enables protection at the switch port level. Select the option that does NOT
represent one of the ACL blocking benefits.
Select one:

More robust control of TCP traffic.

More robust control of UDP traffic.

Block specific (but not all) hosts on a switch port.

Assign access limitations on wireless controllers with the switch plugin.

Limit access on flat networks when there is no opportunity to assign hosts to a VLAN.
Which is a Classify goal?
Select one:

Identify hosts that are blocked by policy

Determine specifics about endpoints that could not be detected in compliance.

Identify hosts that are corporate assets.

Determine specifics about endpoints that could not be detected in control.

Make segments of classified systems, devices, and break them down into organizational
units.

Which of the following is a reason to use guest tags?


Select one:

To provide guests with different types of network access.

To differentiate guest authentication databases.

Categorize approved unmanaged network guests into specific cells.

To restrict user bandwidth within Forescout.

To treat all guests with equal restrictions.

What is required to display a Balloon Message on a managed host?


Select one:

Domain credentials

SecureConnector

A client Web Browser

A layer-two response port

SPAN Session
How can you add more properties to be displayed for an endpoint in the NAC > detections
area?
Select one:

Select Manage Organizational Units

Select Views Panel option

Right click Threat protection

Right click column headers

Select option in the legacy Assets portal

Which design approach has the least visibility into endpoint VLANs?
Select one:

Centralized

Layer 2

Per Appliance Licensing

Distributed

Hybrid

What is required to achieve agentless management of a Windows host?


Select one:

port 445 or 139, RDP, Remote Registry, C$ admin share

port 445 or 139, RPC, Remote Registry, C$ admin share

port 443, 139, RPC, DNS

port 445, 1300, RPC

port 443, 13000, RPC, RDP, Remote Registry


Which of the following is the primary function of the HPS Inspection Engine plugin.
Select one:

It allows Forescout to manage Macintosh endpoints.

It allows Forescout to extract information associated with hosts from Active Directory.

It allows Forescout to manage all hosts.

It allows Forescout to manage Linux endpoints.

It allows Forescout to manage Windows endpoints.

You have drilled down into a dashboard widget and are seeing 3,968 Results on the related
Assets Tab, but when you scroll down to the bottom of the list you see they are not all
displayed. Which of the following is true regarding this situation?
Select one:

You must search using more specific criteria to reduce the number

The search feature will only search through information in the displayed columns

You need to re-run the dashboard policy template

You may export all 3,968 matching endpoints for external analysis

You cannot display more than 2,500 endpoints on the dashboard

Which of the following best defines a sub-rule?


Select one:

An if – then statement that is limited by the main rule and with notification only actions.

An if – then statement that runs independently of the main rule at set intervals.

An if – then statement that informs Forescout of infected end points via the Main rule.

An if – then statement that instructs Forescout how to follow-up with hosts after initial
detection via the Main rule.

An if – then statement that determines whether a host will be processed by other policies.
How do you exit the console? (Choose two).
Select one or more:

Control + P

Go to File>Stop all policies

Control + Alt + Delete

Go to File>Exit

Select the X button

Which of the following is true regarding sub-rules?


Select one:

Sub-rules are evaluated simultaneously.

Sub-rules instruct Forescout how to follow-up with hosts after initial detection via the Main
rule.

All Sub-rules in a policy are evaluated for every host detected via the Main rule.

Sub-rules are if – then statements which must have a condition and an action.

Sub-rules inform Forescout when to follow-up with hosts not detected via the Main rule.

SecureConnector (SC) communicates with Forescout via:


Select one:

RPC over SSL

22/TCP or 445/TCP depending on the operating system

HTTPS

A highly secure, proprietary protocol called D.R.O.R.

A TLS encrypted connection from SC to Forescout


Which of the following does Forescout identify in the Enterprise Discover policy?
Select one:

AntiVirus version

User identity

External device attachment

VOIP devices

Authentication method

Which of the following is NOT required for initial command line installation?
Select one:

IP address

DHCP reservation

Management interface

Administrator password

DNS server

how can you show only active endpoints in the information pane?
Select one:

Select “Filter by online host”

Add an active endpoint column

Deselect “inactive” option

Select “Show only unassigned”

Filter by “internal” option


How do you access the Segment Manager to add a new subnet? (Choose two)
Select one or more:

Right click on Segments in the filters pane.

Select Segment Manager from the Tools menu.

Click on Internal Network pane from Options.

Provision from the Policy Tab

Click on the Options Gear Icon.

Which policy action type can terminate a Windows endpoint service?


Select one:

Notification

Restrict

Manage

Classify

Remediate

Which of the following is true regarding the range of IP addresses configured in Options >
Access > Web?
Select one:

By default, this is the Internal Network range.

Addresses NOT defined here will be able to receive configured Web feature (HTTP, various
portals, User Portal Builder etc).

By default, this is the Active Response range.

Addresses defined here will be able to receive the configured Web feature (HTTP, various
portals, User Portal Builder etc).

Span traffic is not necessary for HTTP redirection pages for Addresses configured here.
When creating a control policy to block hosts, what actions require a vendor compatible
managed switch? (Choose two)
Select one or more:

Action: Email Notification to admin

Action: HTTP Notification to user

Action: Virtual Firewall

Action: Endpoint Address ACL

Action: Switch Block

How did Forescout determine the properties for the portion of the Host Details capture shown
below?

Select one:

Classify Policies

Control Policies

Discover Policy

Assessment Policies

Orchestration Policies
Which statement is true for FLEXX Licensing?
Select one:

Orchestration is supported with the FLEXX Base License

FLEXX Base licensing includes appliance level High Availabiltiy resiliency.

Different versions of FLEXX are required for physical and virtual appliances.

FLEXX Add-On Licenses are needed for See operations.

Endpoint counts are not tied to a specific appliance.

Which of the following properties leverages the Device Classification Engine?


Select one:

Function

NIC

Hostname

Serial Number

User

Complete the statement: Remediation describes


Select one:

Evaluating device ownership to determine compliance

Modifying a manageable endpoint to make it compliant

Changing a VLAN assignment of an endpoint

Blocking an endpoint from the network

Integrating Forescout with a security appliance

Which of the following is NOT configured from Options > Appliance (or from Options >
CounterACT Devices in an Enterprise Manager)?
Select one:

Manage Forescout licenses


Upgrade Forescout

Define Internal Network

Start/Stop appliances

Backup Forescout

Which command determines whether or not Forescout sees TAGGED SPAN traffic on
interface eth1?
Select one:

fstool network status eth1

fstool ifcount eth1

fstool tcpdump -ni eth1 vlans

fstool traffic eth1

ifconfig –eth1 –o traffic

Forescout reads switch bridge tables with unicast traffic methods. Which interface does it
use?
Select one:

Monitor interface

DMZ interface

Response interface

Management interface

SPAN destination

Which Forescout policy type is used to identify and organize selected network assets into
large groups of devices?
Select one:

Control

Discover
Orchestrate

Informational

Assess

Which of the following triggers policy evaluation?


Select one:

Clearing an endpoint detection

A default 24-hour policy timer

Deleting an endpoint from the console

Selecting a policy in the View pane

An Admission Event

Which policy family gathers device properties in order to identify device types?
Select one:

Orchestrate

Discover

Informational

Control

Assess
Which feature is useful for helpdesk personnel who do not have a Console account but need
to obtain all endpoint properties known by Forescout about a particular endpoint and recheck
it for policies?
Select one:

Host Details panel

Legacy Assets Portal

Asset Inventory Tab

Dashboards

Reports Portal
How can you manually download SecureConnector if you have a stand alone appliance?
Select one:

Navigate to [Link]

Navigate to [Link]

Navigate to [Link]

Navigate to [Link]

Navigate to [Link]

Which of the following is NOT a valid option for the user type when adding a user profile?
Select one:

Single password

Group external user directory

Single external user directory

Single smart card

Single external RADIUS

Select the tool used to exclude specific IP addresses from being evaluated by NAC policies.
Select one:

Tactical map

Segments

Ignored IP manager

Active Response Range

Properties - Passive Learning

Which Forescout feature can disable a Telnet session?


Select one:

Discover

Virtual Firewall
Orchestrate

Assess

Classify

What operating system (OS) types are the Console available for?
Select one or more:

Mac OSX

Linux

iOS

Windows

Android

Which feature can generate Donut, Trend or Counter displays for policies?
Select one:

Policy Results panel

Threat Protection Results panel

Dashboards

Reports Portal

Asset Inventory Tab


Which of the following is NOT a service that needs to be running for the HPS Plugin to
manage Windows endpoints?
Select one:

Server

Remote Registry

Windows Management Instrumentation

Security Accounts Manager

Remote procedure call (RPC)

Provided that Options > Discovery rules are activated, which tab of the Console is used to
quickly examine open ports of endpoints?
Select one:

Asset Inventory tab

Dashboard tab
Reports View

Policy Management tab

Threat Detections tab

Disabling external devices via the “disable external devices” action, requires which
component?
Select one:

Host Manageability

Mirrored Traffic

MAC address in a list

SecureConnector

Remote Registry Service

Which of the following are profiling techniques?


Select one or more:

Span traffic screening/scanning

Manual classification

Active Response Ranges

IP Addresses

Active/Passive Banners & fingerprinting

What are some of the questions to ask in a Classify Policy? (Choose two)
Select one or more:

Is it SecureConnector manageable?

Is guest authenticated?

Is the antivirus up to date?

Is it domain or remotely manageable?

Is a specific application installed?


Policy flow could be disrupted if the following best practices option is not selected on most
available policy properties:
Select one:

Stop all policy actions

Evaluate irresolvable criteria

Enable Threat Protection

Ignore information older than 1 hour

Recheck hosts on TCP reset

Forescout collects IP Address to MAC Address mapping information through which of the
following mechanisms:
Select one:

ePO module

DNS Enforcement

User Directory

Advanced Tools Plugin

Switch Plugin

Using the Forescout console, how would you exclude an IP Address from being processed by
all policies but still allow it to be seen by Discovery?
Select one:

Options > Ignored IP Manager

Options > Segment Manager

Tools > Ignored IP Manager

Tools > Segment Manager

Options > CounterACT Devices > Add the IP Address to the IP Assignment block list
Which of the following is NOT true regarding plugins/modules?
Select one:

They can add properties which can then be used in policies to evaluate endpoints.

Licenses must be purchased for all plugins/modules.

They extend Forescout’s capabilities.

They can add actions which can then be applied via policies.

The most common are included in the initial Forescout deployment.

You notice that Threat Protection, HTTP Actions, and Virtual Firewall actions are not
working on a stand alone appliance. What is most likely the cause?
Select one:

An IP-layer channel has not been configured

Partial Enforcement mode is enabled

Full Enforcement mode is enabled

A threat protection exemption has not been configured


It must be controlled by an enterprise manager

Which of the following is not a valid SecureConnector deployment mode for Windows?
(Choose two)
Select one or more:

Run as a web app

Permanent as a service

Temporary as a service

Permanent as an application

Dissolvable

An Enterprise Manager named FSEM01 manages an appliance called FSCT01. You notice
that Threat Protection, HTTP Actions, and Virtual Firewall actions are not working. What is
most likely the cause?
Select one:

A Layer3 channel has not been configured on FSEM01

Full Enforcement mode is enabled for FSCT01

A Layer3 channel has not been configured on FSCT01

Partial Enforcement mode is enabled for FSCT01

FSCT01 has not registered with FSEM01

Which policies determine device ownership?


Select one:

Discover

Assess

Orchestrate

Control

Classify
Which of the following best defines the term “policy”?
Select one:

A set of instructions for identifying, analyzing and responding to a broad range of network
activity within a defined scope which must include sub-rules.

A set of instructions for identifying, analyzing and responding to a broad range of network
activity within a defined scope which must include a main rule and sub-rules.

A set of instructions for identifying, analyzing and responding to a broad range of network
activity within a defined scope for the purpose of visibility, ensuring network compliance,
and security.

A set of instructions for identifying, analyzing and responding to a broad range of network
activity within the entire Internal Network which must include a main rule.

A set of instructions for identifying, analyzing and responding to a broad range of network
activity within the entire Internal Network for the purpose of visibility, ensuring network
compliance and security.

Which of the following are considered Forescout Restrict actions. (Choose two)
Select one or more:

Assign to VLAN

Casper updates

Start SecureConnector

Start windows update

Virtual Firewall

Which of the following is true regarding sub-rules?


Select one:

Sub-rules are if – then statements which must have a condition and an action.

Sub-rules are evaluated in sequence until a match is found.

Sub-rules inform Forescout when to follow-up with hosts not detected via the Main rule.

Sub-rules instruct Forescout how to follow-up with hosts before initial detection via the Main
rule.
All Sub-rules in a policy are evaluated for every host detected via the Main rule.

Which feature utilizes widgets?


Select one:

Dashboards

Options Policy Templates

Reports Portal

Asset Inventory Tab

Options Add Plugins

Which of the following is NOT an action you can take with a policy?
Select one:

Block managed hosts

Block rogue hosts

Remediate managed hosts

Remediate rogue hosts

Notify end users and IT security teams

Which of the following plugins is included in the Endpoint Base Module?


Select one:

HPS Inspection Engine

IoT Posture Assessment Engine

DHCP Classifier

Switch

Device Profile Library

Which of the following does NOT represent one of the elements of a policy structure?
Select one:

Policy conditions
History

A unique policy name

A policy scope

Policy actions

Select a property that Forescout uses during discovery to identify the device type.
Select one:

Applications Installed

Open sessions

Device manageability

Operating System

AV up to date

Endpoints found manageable by Classify policies are sent on to which type of policy?
Select one:

Control Policies

Informational Policies

Orchestration Policies

Discover Policy

Assess Policies
Which policy action type can modify a switch port?
Select one:

Restrict

Classify

Manage

Remediate

Notification

Which of the following is NOT required to show the “Health Monitoring” dashboard tab?
Select one:

Run the Virtual Appliances Inventory template

Run the Physical Appliances Inventory template

Run the Health Monitoring Policies template

Add the Health Monitoring tab to the dashboard

Run the Dashboard Policies template

What ports are used by a Forescout appliance to communicate with the Enterprise Manager
and endpoints (of all OS types) running SecureConnector?
Select one:

10005, 10003, 80, 22

10003, 80, 443, 22

13000, 10003, 10005, 10006

13000, 10002, 445, 139

1300, 445, 103, 22

Which two of the following are Restrict actions? (Choose two)


Select one or more:

Uninstall BitTorrent on an endpoint

Shutdown a switch port


Start SecureConnector

Disable a running endpoint process

Virtual FireWall to block a Telnet session

Which of the following is NOT an advantage of SecureConnector?


Select one:

Apply a switch ACL to an endpoint

Send a notification balloon to the desktop

To disable External Devices

Improve kill frequency when working with the Kill Process

Change the VLAN for a host connected through a VoIP phone.

Which Forescout interfaces are needed for a layer 3 channel? (Choose two)
Select one or more:

Trunk interface

NetFlow interface

Response interface

Monitor interface

Management interface
What is Forescout Assessment?
Select one:

A way to identify endpoints that need remediation to meet corporate security expectations.

A way to populate the Asset portal

A set of policies that quarantine endpoints that do not meet corporate security expectations

A way to delineate systems by OS

A mechanism to force endpoints to meet corporate security AntiVirus expectations

You might also like