NSE6_FNC-8.5 Exam Question 6
What causes a host's state to change to "at risk"?
NSE6_FNC-8.5 Exam Question 7
With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
NSE6_FNC-8.5 Exam Question 8
Which agent is used only as part of a login script?
NSE6_FNC-8.5 Exam Question 9
Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
NSE6_FNC-8.5 Exam Question 10
Which two of the following are required for endpoint compliance monitors? (Choose two.)