Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibit.

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.

In this scenario, which two setups will achieve these requirements? (Choose two.)

A.

Configure ZTNA servers and ZTNA policies on FortiGate.

B.

Configure FortiGate as a zero trust network access (ZTNA) access proxy.

C.

Configure ZTNA tags on FortiGate.

D.

Configure private access policies on FortiSASE with ZTNA.

Refer to the exhibit.

An organization must inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical interface.

Which configuration must you apply to achieve this requirement?

A.

Configure a steering bypass tunnel firewall policy using Google Maps FQDN to exclude and redirect the traffic.

B.

Add the Google Maps URL in the zero trust network access (ZTNA) TCP access proxy forwarding rule.

C.

Add the Google Maps URL as a steering bypass destination in the endpoint profile.

D.

Exempt Google Maps in URL filtering in the web filter profile.

A customer wants to ensure secure access for private applications for their users by replacing their VPN.

Which two SASE technologies can you use to accomplish this task? (Choose two.)

A.

zero trust network access (ZTNA)

B.

secure SD-WAN

C.

secure web gateway (SWG) and cloud access security broker (CASB)

D.

SD-WAN on-ramp

Which FortiSASE component protects users from online threats by hosting their browsing sessions on a remote container within a secure environment?

A.

secure web gateway (SWG)

B.

remote browser isolation (RBI)

C.

cloud access security broker (CASB)

D.

data loss prevention (DLP)

Which two advantages does FortiSASE bring to businesses with microbranch offices that have FortiAP deployed for unmanaged devices? (Choose two.)

A.

It secures internet access both on and off the network.

B.

It uses zero trust network access (ZTNA) tags to perform device compliance checks.

C.

It eliminates the requirement for an on-premises firewall.

D.

It simplifies management and provisioning.