Refer to the exhibit, and then answer the question below.
Which host is rogue?
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
Which command line shell and scripting language does FortiNAC use for WinRM?
Open Windows PowerShell or a command prompt. Run the following command to determine if you already have WinRM over HTTPS configured.
Admin Guide on p. 362, 'Matches if the device successfully responds to a WinRM client session request. User name and password credentials are required. If there are multiple credentials, each set of credentials will be attempted to find a potential match. The commands are used to automate interaction with the device. Each command is run via Powershell.'
Where do you look to determine when and why the FortiNAC made an automated network access change?
Study Guide p. 356: Any time FortiNAC changes network access for an endpoint, the change is documented on the Port Changes view. This provides an administrator with valuable information when validating control configurations and enforcement.