Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

To complete their day-to-day operations, remote users require access to a TCP-based application that is hosted on a private web server. Which FortiSASE deployment use case provides the most efficient and secure method for meeting the remote users' requirements?

A.

SD-WAN private access

B.

inline-CASB

C.

zero trust network access (ZTNA) private access

D.

next generation firewall (NGFW)

Refer to the exhibits.

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org. Traffic logs show traffic is allowed by the policy.

Which configuration on FortiSASE is allowing users to perform the download?

A.

Web filter is allowing the traffic.

B.

IPS is disabled in the security profile group.

C.

The HTTPS protocol is not enabled in the antivirus profile.

D.

Force certificate inspection is enabled in the policy.

During FortiSASE provisioning, how many security points of presence (POPs) need to be configured by the FortiSASE administrator?

A.

3

B.

4

C.

2

D.

1

A customer wants to upgrade their legacy on-premises proxy to a could-based proxy for a hybrid network. Which FortiSASE features would help the customer to achieve this outcome?

A.

SD-WAN and NGFW

B.

SD-WAN and inline-CASB

C.

zero trust network access (ZTNA) and next generation firewall (NGFW)

D.

secure web gateway (SWG) and inline-CASB

Which two statements describe a zero trust network access (ZTNA) private access use case? (Choose two.)

A.

The security posture of the device is secure.

B.

All FortiSASE user-based deployments are supported.

C.

All TCP-based applications are supported.

D.

Data center redundancy is offered.

In which three ways does FortiSASE help organizations ensure secure access for remote workers? (Choose three.)

A.

It enforces multi-factor authentication (MFA) to validate remote users.

B.

It secures traffic from endpoints to cloud applications.

C.

It uses the identity & access management (IAM) portal to validate the identities of remote workers.

D.

It offers zero trust network access (ZTNA) capabilities.

E.

It enforces granular access policies based on user identities.

An organization wants to block all video and audio application traffic but grant access to videos from CNN Which application override action must you configure in the Application Control with Inline-CASB?

A.

Allow

B.

Pass

C.

Permit

D.

Exempt

Which two components are part of onboarding a secure web gateway (SWG) endpoint? (Choose two)

A.

FortiSASE CA certificate

B.

proxy auto-configuration (PAC) file

C.

FortiSASE invitation code

D.

FortiClient installer

Which two deployment methods are used to connect a FortiExtender as a FortiSASE LAN extension? (Choose two.)

A.

Connect FortiExtender to FortiSASE using FortiZTP

B.

Enable Control and Provisioning Wireless Access Points (CAPWAP) access on the FortiSASE portal.

C.

Enter the FortiSASE domain name in the FortiExtender GUI as a static discovery server

D.

Configure an IPsec tunnel on FortiSASE to connect to FortiExtender.

Refer to the exhibit.

To allow access, which web tiller configuration must you change on FortiSASE?

A.

FortiGuard category-based filter

B.

content filter

C.

URL Filter

D.

inline cloud access security broker (CASB) headers