Cyber Monday Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

FSCP Forescout Certified Professional Exam Questions and Answers

Questions 4

Which of the following User Directory server settings is necessary to enable guest approval by sponsors?

Options:

A.

Policy to control

B.

Guest Tags

C.

Sponsor Group

D.

Guest password policy

E.

Authentication Server

Buy Now
Questions 5

What is the default recheck timer for a NAC policy?

Options:

A.

24 hours

B.

8 hours

C.

4 hours

D.

12 hours

E.

2 hours

Buy Now
Questions 6

Which of the following best describes why PXE boot endpoints should be exempt from Assessment policies?

Options:

A.

Because they will not be subject to the Acceptable Use Policy

B.

They have already been deployed and should immediately be subject to Assessment policies

C.

Because they are not yet manageable and may not have all the required software and services installed

D.

Because they will never be manageable or have the required software and services

E.

Because they are special endpoints playing a specific role in the network

Buy Now
Questions 7

Which of the following requires secure connector to resolve?

Options:

A.

Authentication login (advanced)

B.

Authentication certificate status

C.

HTTP login user

D.

Authentication login

E.

Signed-In status

Buy Now
Questions 8

Which of the following best describes the 4th step of the basic troubleshooting approach?

Options:

A.

Gather Information from the command line

B.

Network Dependencies

C.

Consider CounterACT Dependencies

D.

Form Hypothesis, Document and Diagnose

E.

Gather Information from CounterACT

Buy Now
Questions 9

Which of the following is true regarding how CounterACT restores a quarantined endpoint to its original production VLAN after the "Assign to VLAN Action" is removed?

Options:

A.

This happens automatically because CounterACT compares the running and startup configs

B.

This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not changed in the switch running config

C.

This happens automatically as long as no configuration changes to the switch are made to the running config

D.

This happens automatically as long as configuration changes to the switchport access VLAN of affected ports are not saved in the startup config

E.

A policy is required to ensure this happens correctly.

Buy Now
Questions 10

Which of the following is a switch plugin property that can be used to identify endpoint connection location?

Options:

A.

Switch Location

B.

Switch Port Alias

C.

Switch IP/FQDN and Port Name

D.

Switch Port Action

E.

Wireless SSID

Buy Now
Questions 11

Which of the following actions can be performed with Remote Inspection?

Options:

A.

Set Registry Key, Disable dual homing

B.

Send Balloon Notification, Send email to user

C.

Disable External Device, Start Windows Updates

D.

Start Secure Connector, Attempt to open a browser at the endpoint

E.

Endpoint Address ACL, Assign to VLAN

Buy Now
Questions 12

Policies will recheck when certain conditions are met. These may include...

Options:

A.

Admission event, group name change, Scope recheck timer expires

B.

Policy recheck timer expires, admission event, SC event change

C.

Admission event, policy categorization, SC event change

D.

Policy categorization, admission event, action schedule activation

E.

Policy recheck timer expires, group name change, SC event change

Buy Now
Questions 13

What should you do first when preparing for an upgrade to a new CounterACT version?

Options:

A.

Upgrade the members first before upgrading the EM.

B.

Upgrading an appliance is done through Options/Modules.

C.

From the appliance CLI, fstool upgrade /tmp/counteract-v8.0.1.fsp

D.

Consult the CounterACT® Release Notes for the appropriate version

E.

Upgrade only the modules compatible with the version you are installing.

Buy Now
Questions 14

How are additional recipients added to a "Send Mail" action?

Options:

A.

Thru the setting on Tools > Options > General > Mail and adding the recipients separated by commas

B.

Thru the policy "Send Mail" action, under the Parameters tab add the recipients separated by commas

C.

Thru Tools > Options > Advanced - Mail and adding the recipients separated by semi-colons

D.

Thru the Tools > Options > NAC Email and adding the recipients separated by semi-colons

E.

Thru the policy sub rule and adding a condition for each of the desired recipients

Buy Now
Questions 15

Which field in the User Directory plugin should be configured for Active Directory subdomains?

Options:

A.

Replicas

B.

Address

C.

Parent Groups

D.

Domain Aliases

E.

DNS Detection

Buy Now
Questions 16

What Protocol does CounterACT use to verify the revocation status of certificates?

Options:

A.

PKI Certificate Revocation Protocol (PCRP)

B.

Online Certificate Status Protocol (OCSP)

C.

Online Revocation Status Protocol (ORSP)

D.

Certificate Revocation List Protocol (CRLP)

E.

Certificate Revocation Protocol (CRP)

Buy Now
Questions 17

If the condition of a sub-rule in your policy is looking for Windows Antivirus updates, how should the scope and main rule read?

Options:

A.

Scope "all ips", filter by group blank, main rule member of group "Windows"

B.

Scope "corporate range", filter by group "None", main rule "member of Group = Windows"

C.

Scope "threat exemptions", filter by group "windows managed", main rule "member of group = windows"

D.

Scope "corporate range", filter by group "windows managed", main rule "No conditions"

E.

Scope "all ips", filter by group "windows", main rule "No Conditions"

Buy Now
Questions 18

What best defines a 'Post-Connect Methodology'?

Options:

A.

802.1X is a flavor of Post-Connect

B.

Guilty until proven innocent

C.

Innocent until proven guilty

D.

Used subsequent to pre-connect

E.

Assessed for critical compliance before IP address is assigned

Buy Now
Questions 19

Main rules are executed independently of each other. However, one policy may be set to run first by configuring which of the following?

Options:

A.

There is no way to cause one policy to run first

B.

Setting the Main Rule condition to utilize primary classification

C.

Categorizing the Policy as an assessment policy

D.

Categorizing the Policy as a classifier

E.

Using Irresolvable criteria

Buy Now
Questions 20

Which of the following statements is true regarding Layer-2 channel?

Options:

A.

Recommended when there are a large number of VLANs

B.

Response interface is a VLAN trunk

C.

Monitor interface is a trunk

D.

Utilizes two interfaces

E.

Appliance monitor interface must be connected to an access layer switch

Buy Now
Questions 21

In a multi-site Distributed deployment, what needs to be done so that switch management traffic does not cross the WAN?

Options:

A.

Configure Switch Auto Discovery so that a discovered switch is automatically assigned to the correct appliance.

B.

Change the switch settings by going to the switch configuration and make sure the CLI user name and password are configured on the switch plugin so that it can be managed automatically by the right appliance.

C.

Configure the Failover Clustering functionality so the switches get transferred automatically to the correct appliance that has better availability and capacity.

D.

Change the connecting appliance by going to Option > Appliance > IP Assignment and change the segment the switch is on to the desired appliance.

E.

Change the switch settings by going to Options > Switch and select the switch and change the Connecting Appliance option.

Buy Now
Questions 22

Which of the following is the best way to brand the CounterACT HTTP pages to look like corporate internal web pages?

Options:

A.

Using the "Reports Portal," modify the CSS for the desired skins

B.

This is not possible with CounterACT portal and HTTP pages

C.

Using the "User Portal Builder," modify the CSS for the desired skins

D.

Have a webmaster modify the HTML pages within the Tomcat web server

E.

Using the "User Portal Builder" basic interface

Buy Now
Questions 23

Proper policy flow should consist of...

Options:

A.

Modify as little as possible in discovery, each classify sub-rule should flow to an assess policy, IoT classify policies typically test ownership, IT classify usually indicates ownership.

B.

Modify as little as possible in discovery, each classify sub-rule should flow to an assess policy, IoT classify policies typically test manageability, IT classify usually indicates ownership.

C.

Modify as little as possible in discovery, each sub-rule should flow to assess. IT classify policies typically test manageability, IoT classify usually indicates ownership.

D.

Discovery should include customized sub-rules, each discovery sub-rule should flow to a classify policy, IT classify policies typically test manageability, IoT classify usually indicates ownership.

E.

Modify as little as possible in discovery, each discovery sub-rule should flow to a classify policy. IT classify policies typically test manageability, IoT classify usually indicates ownership.

Buy Now
Questions 24

Which of the following is the SMB protocol version required to manage Windows XP or Windows Vista endpoints?

Options:

A.

SMB V3.1.1

B.

SMB V1.0

C.

SMB is not required for XP or Vista

D.

SMB V2.0

E.

SMB V3.0

Buy Now
Exam Code: FSCP
Exam Name: Forescout Certified Professional Exam
Last Update: Dec 7, 2025
Questions: 80
FSCP pdf

FSCP PDF

$25.5  $84.99
FSCP Engine

FSCP Testing Engine

$30  $99.99
FSCP PDF + Engine

FSCP PDF + Testing Engine

$40.5  $134.99