Big Halloween Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

FSCP Forescout Certified Professional Exam Questions and Answers

Questions 4

Which of the following logs are available from the GUI?

Options:

A.

Host Details, Policy, Blocking, Event Viewer, Audit Trail

B.

Switch, Policy, Blocking, Event Viewer, Audit Trail

C.

Switch, Discovery, Threat Protection, Event Viewer, Audit Trail

D.

HPS, Policy, Threat Protection, Event Viewer, Audit Trail

E.

Host Details, Policy, Today Log, Threat Event Viewer, Audit Trail

Buy Now
Questions 5

What is NOT an admission event?

Options:

A.

DHCP Request

B.

IP Address Change

C.

Host becomes offline

D.

Login to an authentication server

E.

New VPN user

Buy Now
Questions 6

Which of the following is true regarding Failover Clustering module configuration?

Options:

A.

Once appliances are configured, then press the Apply button.

B.

Segments should be assigned to appliance folders and NOT to the individual appliances.

C.

You can see the status of failover by selecting IP Assignments and failover tab.

D.

Configure the second HA on the Secondary node.

E.

Place only the EM to participate in failover in the folder.

Buy Now
Questions 7

What should be done after the Managed Windows devices are sent to a policy to determine the Windows 10 patch delivery optimization setting?

Options:

A.

Push out the proper DWORD setting via GPO

B.

Non Windows 10 devices must be called out in sub-rules since they will not have the relevant DWORD

C.

Manageable Windows devices are not required by this policy

D.

Non Windows 10 devices must be called out in sub-rules so that the relevant DWORD value may be changed

E.

Write sub-rules to check for each of the DWORD values used in patch delivery optimization

Buy Now
Questions 8

What is required for CounterAct to parse DHCP traffic?

Options:

A.

Must see symmetrical traffic

B.

The enterprise manager must see DHCP traffic

C.

DNS client must be running

D.

DHCP classifier must be running

E.

Plugin located in Network module

Buy Now
Questions 9

Which of the following properties can be determined by the HPS Plugin? (Choose two)

Options:

A.

Application installed on Mac OS

B.

External Device on Windows

C.

Operating System

D.

AD group membership

E.

HTTP banner

Buy Now
Questions 10

When using Remote Inspection for Windows, which of the following properties require fsprocsvc.exe interactive scripting?

Options:

A.

User Directory Common Name

B.

Update Microsoft Vulnerabilities

C.

Windows Expected Script Result

D.

Antivirus Running

E.

Windows Service Running

Buy Now
Questions 11

What is the best practice for order of sub rules?

Options:

A.

Last rule should capture the highest number of endpoints

B.

First rule should capture the lowest number of endpoints

C.

Second rule should capture the highest number of endpoints

D.

Last rule should not use a catch all

E.

First rule should capture the highest number of endpoints

Buy Now
Questions 12

How can a specific event detected by CounterACT (such as a P2P compliance violation event) be permanently recorded with a custom message for auditing purposes?

Options:

A.

Customize the message on the send syslog action

B.

Increase the "Purge Inactivity Timeout" setting

C.

Customize the message in the Reports Portal

D.

Configure a custom SNMP trap to be sent

E.

Customize the message in the syslog configuration in Options > Core Ext > Syslog

Buy Now
Questions 13

Why is SMB required for Windows Manageability?

Options:

A.

Scripts run on CounterACT are copied to a temp directory and run locally on the endpoint

B.

Scripts run on endpoints are copied to a Linux script repository and run locally on the endpoint

C.

Scripts run on endpoints are copied to a temp directory and run remotely from CounterACT

D.

Scripts run on CounterACT are copied to a script repository and run remotely from CounterACT

E.

Scripts run on endpoints are copied to a temp directory and run locally on the endpoint

Buy Now
Questions 14

Where are the plugin logs located in the CounterACT CLI?

Options:

A.

/usr/local/forescout/plugin//log

B.

/usr/local/forescout/plugin/log/

C.

/usr/local/forescout/log

D.

/usr/local/log/plugin/

E.

/usr/local/forescout/log/plugin/

Buy Now
Questions 15

If the condition of a sub-rule in your policy is looking for Windows Antivirus updates, how should the scope and main rule read?

Options:

A.

Scope "all ips", filter by group blank, main rule member of group "Windows"

B.

Scope "corporate range", filter by group "None", main rule "member of Group = Windows"

C.

Scope "threat exemptions", filter by group "windows managed", main rule "member of group = windows"

D.

Scope "corporate range", filter by group "windows managed", main rule "No conditions"

E.

Scope "all ips", filter by group "windows", main rule "No Conditions"

Buy Now
Questions 16

Which of the following plugins assists in classification for computer endpoints? (Choose two)

Options:

A.

Switch

B.

HPS Inspection Engine

C.

Linux Plugin

D.

Advanced Tools

E.

DNS Client

Buy Now
Questions 17

Which of the following is true when setting up an Enterprise Manager as a High Availability Pair?

Options:

A.

If HA reboots, this is an indication of a problem.

B.

Set up HA on the Secondary node first.

C.

Connect devices to the network and to each other.

D.

HA needs to be manually configured on the secondary appliance in order to sync correctly.

E.

HA requires a license.

Buy Now
Questions 18

Which of the following are included in System backups?

Options:

A.

Switch Plugin version 8.7.0 and above

B.

Policies

C.

Hostname and IP address

D.

Failover Clustering plugin

E.

Wireless Plugin version 1.4.0 and above

Buy Now
Questions 19

When using the discover properties OS, Function, Network Function and NIC Vendor and Module, certain hosts may not be correctly profiled. What else may be used to provide additional possible details to assist in correctly profiling the host?

Options:

A.

Monitoring traffic

B.

Packet engine

C.

Advanced Classification

D.

NMAP Scanning

E.

Function

Buy Now
Questions 20

When troubleshooting an issue that affects multiple endpoints, why might you choose to view Policy logs before Host logs?

Options:

A.

Because you can gather more pertinent information about a single host

B.

Because Policy logs show details for a range of endpoints

C.

You would not. Host logs are the best choice for a range of endpoints

D.

Policy logs may help to pinpoint the issue for a specific host

E.

Looking at Host logs is always the first step in the process

Buy Now
Questions 21

Which of the following best describes the 4th step of the basic troubleshooting approach?

Options:

A.

Gather Information from the command line

B.

Network Dependencies

C.

Consider CounterACT Dependencies

D.

Form Hypothesis, Document and Diagnose

E.

Gather Information from CounterACT

Buy Now
Questions 22

Which type of endpoint can be queried for registry key properties?

Options:

A.

Managed unknown endpoint

B.

Unmanaged Windows endpoint

C.

Managed Windows endpoint

D.

Windows endpoint

E.

Managed Linux endpoint

Buy Now
Questions 23

What is true of the "Use as directory" selection configured below?

FSCP Question 23

Select one:

Options:

A.

It allows resolution of User information via LDAP

B.

It allows resolution of user information via TACACS

C.

It allows for Guest Registration when Approvals are required

D.

It enables HTTP authentication and resolves HTTP login status

E.

It allows resolution of user information via RADIUS

Buy Now
Questions 24

Which of the following lists contain items you should verify when you are troubleshooting a failed switch change VLAN action?

Select one:

Options:

A.

The Switch Vendor is compatible for the change VLAN action

The Enterprise manager IP is allowed read VLAN access to the switch

The network infrastructure allows CounterACT SSH and SNMP Get traffic to reach the switch

The action is disabled in the policy

The Switch Model is compatible for ACL actions

The Enterprise manager IP is allowed write VLAN changes to the switch

The network infrastructure allows Cou

B.

The Switch Vendor is compatible for the change VLAN action

The managing appliance IP is allowed read VLAN access to the switch

The network infrastructure allows CounterACT SSH and SNMP Get traffic to reach the switch

The action is disabled in the policy

C.

The Switch Model is compatible for the change VLAN action

The managing appliance IP is allowed write VLAN changes to the switch

The network infrastructure allows CounterACT SSH and SNMP Set traffic to reach the switch

The action is enabled in the policy

D.

The Switch Vendor is compatible for all actions

The managing appliance IP is allowed read VLAN access to the switch

The network infrastructure allows CounterACT SSH and SNMP Set traffic to reach the switch

The action is enabled in the policy

Buy Now
Exam Code: FSCP
Exam Name: Forescout Certified Professional Exam
Last Update: Oct 30, 2025
Questions: 80

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now FSCP testing engine

PDF (Q&A)

$31.5  $104.99
buy now FSCP pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 30 Oct 2025