NSE6_FNC-8.5 Exam Question 6

What causes a host's state to change to "at risk"?
  • NSE6_FNC-8.5 Exam Question 7

    With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
  • NSE6_FNC-8.5 Exam Question 8

    Which agent is used only as part of a login script?
  • NSE6_FNC-8.5 Exam Question 9

    Which two methods can be used to gather a list of installed applications and application details from a host? (Choose two.)
  • NSE6_FNC-8.5 Exam Question 10

    Which two of the following are required for endpoint compliance monitors? (Choose two.)