Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following describes the FortiSASE inline-CASB component?

A.

It provides visibility for unmanaged locations and devices.

B.

It is placed directly in the traffic path between the endpoint and cloud applications.

C.

It uses API to connect to the cloud applications.

D.

It detects data at rest.

Which statement best describes the Digital Experience Monitor (DEM) feature on FortiSASE?

A.

It provides end-to-end network visibility from all the FortiSASE security PoPs to a specific SaaS application.

B.

It can be used to request a detailed analysis of the endpoint from the FortiGuard team.

C.

It requires a separate DEM agent to be downloaded from the FortiSASE portal and installed on the endpoint.

D.

It can help IT and security teams ensure consistent security monitoring for remote users.

What are two advantages of using zero-trust tags? (Choose two.)

A.

Zero-trust tags can be used to allow or deny access to network resources

B.

Zero-trust tags can determine the security posture of an endpoint.

C.

Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints

D.

Zero-trust tags can be used to allow secure web gateway (SWG) access