Cyber Monday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

FSCP Sample Questions Answers

Questions 4

Which of the following switch actions cannot both be used concurrently on the same switch?

Options:

A.

Access Port ACL & Switch Block

B.

Switch Block & Assign to VLAN

C.

Endpoint Address ACL & Assign to VLAN

D.

Access Port ACL & Endpoint Address ACL

E.

Access Port ACL & Assign to VLAN

Buy Now
Questions 5

Place the DNS Enforce control actions into the correct workflow order for endpoints which have a pending control action.

Options:

Buy Now
Questions 6

Which of the following actions can be performed with Remote Inspection?

Options:

A.

Set Registry Key, Disable dual homing

B.

Send Balloon Notification, Send email to user

C.

Disable External Device, Start Windows Updates

D.

Start Secure Connector, Attempt to open a browser at the endpoint

E.

Endpoint Address ACL, Assign to VLAN

Buy Now
Questions 7

Which of the following are included in System backups?

Options:

A.

Switch Plugin version 8.7.0 and above

B.

Policies

C.

Hostname and IP address

D.

Failover Clustering plugin

E.

Wireless Plugin version 1.4.0 and above

Buy Now
Questions 8

What is required for CounterAct to parse DHCP traffic?

Options:

A.

Must see symmetrical traffic

B.

The enterprise manager must see DHCP traffic

C.

DNS client must be running

D.

DHCP classifier must be running

E.

Plugin located in Network module

Buy Now
Questions 9

Which type of endpoint can be queried for registry key properties?

Options:

A.

Managed unknown endpoint

B.

Unmanaged Windows endpoint

C.

Managed Windows endpoint

D.

Windows endpoint

E.

Managed Linux endpoint

Buy Now
Questions 10

Which of the following is a characteristic of a centralized deployment?

Options:

A.

Checking Microsoft vulnerabilities at remote site may have significant bandwidth impact

B.

Provides enhanced IPS and HTTP actions

C.

Is optimal for threat protection

D.

Deployed as a Layer-2 channel

E.

Every site has an appliance

Buy Now
Questions 11

Based on ForeScout's recommended troubleshooting approach, where should you start the troubleshooting process?

Options:

A.

Run fstool tech-support

B.

Check that requirements are met

C.

Look at dependencies

D.

Examine the GUI Logs

E.

Review command line logs

Buy Now
Questions 12

How are additional recipients added to a "Send Mail" action?

Options:

A.

Thru the setting on Tools > Options > General > Mail and adding the recipients separated by commas

B.

Thru the policy "Send Mail" action, under the Parameters tab add the recipients separated by commas

C.

Thru Tools > Options > Advanced - Mail and adding the recipients separated by semi-colons

D.

Thru the Tools > Options > NAC Email and adding the recipients separated by semi-colons

E.

Thru the policy sub rule and adding a condition for each of the desired recipients

Buy Now
Questions 13

Which of the following are endpoint attributes learned from the Switch plugin?

Options:

A.

Host Name, Mac table, Switch IP, Port Description, Host Table, Switch Version

B.

Port VLAN, Switch Version, Mac address, Host name, Port Description, ARP Table, Switch Version

C.

Mac address, Host name, Port VLAN, Port Description, Switch OS, Switch Version

D.

Switch Version, Mac address, Switch OS, Port VLAN, Host Name, ARP Table

E.

Mac address, Switch IP and Port name, ARP Table, Switch Port Information

Buy Now
Questions 14

Why is SMB required for Windows Manageability?

Options:

A.

Scripts run on CounterACT are copied to a temp directory and run locally on the endpoint

B.

Scripts run on endpoints are copied to a Linux script repository and run locally on the endpoint

C.

Scripts run on endpoints are copied to a temp directory and run remotely from CounterACT

D.

Scripts run on CounterACT are copied to a script repository and run remotely from CounterACT

E.

Scripts run on endpoints are copied to a temp directory and run locally on the endpoint

Buy Now
Questions 15

Updates to the Device Profile Library may impact a device's classification if the device was classified using:

Options:

A.

Advanced Classification

B.

External Devices

C.

Client Certificates

D.

HTTP Banner

E.

Guest Registration

Buy Now
Questions 16

What best defines a 'Post-Connect Methodology'?

Options:

A.

802.1X is a flavor of Post-Connect

B.

Guilty until proven innocent

C.

Innocent until proven guilty

D.

Used subsequent to pre-connect

E.

Assessed for critical compliance before IP address is assigned

Buy Now
Questions 17

When an admission event is seen, how are main rules and sub-rules processed?

Options:

A.

Main rules process concurrently, sub-rules process sequentially.

B.

Main rules process in parallel, sub-rules process concurrently.

C.

Main rules process concurrently, sub-rules process in parallel.

D.

Main rules process sequentially, sub-rules process concurrently.

E.

Main rules process sequentially, sub-rules process in parallel.

Buy Now
Questions 18

When troubleshooting a SecureConnector management issue for a Windows host, how would you determine if SecureConnector management packets are reaching CounterACT successfully?

Options:

A.

Use the tcpdump command and filter for tcp port 10005 traffic from the host IP address reaching the monitor port

B.

Use the tcpdump command and filter for tcp port 2200 traffic from the host IP address reaching the management port

C.

Use the tcpdump command and filter for tcp port 10003 traffic from the host IP address reaching the monitor port

D.

Use the tcpdump command and filter for tcp port 2200 traffic from the host IP address reaching the management port

E.

Use the tcpdump command and filter for tcp port 10003 traffic from the host IP address reaching the management port

Buy Now
Questions 19

How can scripts be run when the Endpoint Remote Inspection method is set to "Using MS-WMI"?

Options:

A.

Using Task Scheduler but this has limitations

B.

Using WMI, which will allow interactive scripts to run

C.

Using RRP, which will allow interactive scripts to run

D.

Using WMI, but they may not be run interactively using this method

E.

Using fsprocserv.exe, but scripts may not be run interactively using this method

Buy Now
Questions 20

Which of the following best describes the 4th step of the basic troubleshooting approach?

Options:

A.

Gather Information from the command line

B.

Network Dependencies

C.

Consider CounterACT Dependencies

D.

Form Hypothesis, Document and Diagnose

E.

Gather Information from CounterACT

Buy Now
Questions 21

Which type of signed SSL Certificate file formats are compatible with CounterACT?

Options:

A.

.Pfx/.p12, .Pfx/.p7

B.

.p7b, .pem

C.

.X.509, x.507

D.

.Pckcs#7, .pckcs#12

E.

.cer, .crt

Buy Now
Questions 22

Main rules are executed independently of each other. However, one policy may be set to run first by configuring which of the following?

Options:

A.

There is no way to cause one policy to run first

B.

Setting the Main Rule condition to utilize primary classification

C.

Categorizing the Policy as an assessment policy

D.

Categorizing the Policy as a classifier

E.

Using Irresolvable criteria

Buy Now
Questions 23

When configuring policy conditions, which of the statements is true regarding this image?

Select one:

Options:

A.

Negates the criteria as part of the property

B.

Modifies the irresolvable condition to TRUE

C.

Generates a NOT condition in the sub-rule condition

D.

Irresolvable hosts would match the condition

E.

Modifies the evaluate irresolvable condition to FALSE

Buy Now
Questions 24

The host property 'service banner' is resolved by what function?

Options:

A.

Packet engine

B.

NMAP scanning

C.

Device classification engine

D.

Device profile library

E.

NetFlow

Buy Now
Exam Code: FSCP
Exam Name: Forescout Certified Professional Exam
Last Update: Dec 7, 2025
Questions: 80
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now FSCP