Fortinet FCP_FAC_AD-6.5 FCP—FortiAuthenticator 6.5 Administrator Online Training
Fortinet FCP_FAC_AD-6.5 Online Training
The questions for FCP_FAC_AD-6.5 were last updated at Nov 19,2024.
- Exam Code: FCP_FAC_AD-6.5
- Exam Name: FCP—FortiAuthenticator 6.5 Administrator
- Certification Provider: Fortinet
- Latest update: Nov 19,2024
Which two features of FortiAuthenticator are used for EAP deployment? (Choose two)
- A . Certificate authority
- B . LDAP server
- C . MAC authentication bypass
- D . RADIUS server
Which EAP method is known as the outer authentication method?
- A . MSCHAPv2
- B . PEAP
- C . EAP-GTC
- D . EAP-TLS
You are a FortiAuthenticator administrator for a large organization. Users who are configured to use FortiToken 200 for two-factor authentication can no longer authenticate.
You have verified that only the users with two-factor authentication are experiencing the issue.
What can cause this issue?
- A . FortiToken 200 license has expired.
- B . One of the FortiAuthenticator devices in the active-active cluster has failed.
- C . Time drift between FortiAuthenticator and hardware tokens.
- D . FortiAuthenticator has lost contact with the FortiToken Cloud servers.
What is the function of RADIUS profiles and realms in authentication?
- A . They provide secure encryption for user data
- B . They enable remote access to user files
- C . They authenticate users based on their IP addresses
- D . They manage authentication settings and methods for RADIUS users
Which protocol is commonly used for RADIUS single sign-on (RSSO) to integrate third-party logon events with Fortinet Single Sign-On (FSSO)?
- A . HTTP
- B . SNMP
- C . RADIUS
- D . DNS
A device that is 802.1X non-compliant must be connected to the network.
Which authentication method can you use to authenticate the device with FortiAuthenticator?
- A . EAP-TTLS
- B . EAP-TLS
- C . MAC-based authentication
- D . Machine-based authentication
You are the administrator of a large network and you want to track your users by leveraging the FortiClient SSO Mobility Agent. As part of the deployment you want to make sure that a bad actor will not be allowed to authenticate with an unauthorized AD server and appear as a legitimate user when reported by the agent.
Which option can prevent such an attack?
- A . Add only the trusted AD servers to a valid servers group.
- B . Change the Secret key in the Enable authentication option for the FortiClient Mobility Agent Service.
- C . Enable the Enable RADIUS accounting SSO clients method.
- D . Enable the Enable NTLM option in the FortiClient Mobility Agent Service.
Which of the following services can be configured for remote authentication in FortiAuthenticator?
- A . Online shopping
- B . Social media integration
- C . Remote desktop access
- D . Virtual reality gaming
In a PKI infrastructure, what is the purpose of the root certificate?
- A . It is used for encrypting sensitive user data
- B . It is a backup certificate for emergency situations
- C . It is the certificate of the end user in a communication
- D . It is the highest-level certificate that signs other certificates
Which of the following is a recommended practice when configuring FortiAuthenticator for deployment?
- A . Disabling all authentication methods except one
- B . Using the default factory settings for quicker deployment
- C . Enabling all available authentication methods for flexibility
- D . Disabling all user roles to simplify access control