Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which secure internet access (SIA) use case minimizes individual endpoint configuration?

A.

Agentless remote user internet access

B.

Site-based remote user internet access

C.

SIA using ZTNA

D.

SIA for FortiClient agent remote users

Which two purposes is the dedicated IP address used for in a FortiSASE deployment? (Choose two.)

A.

For user access control to FortiSASE

B.

For allocation and assignment of unique IP addresses to remote users

C.

For regulatory compliance

D.

For isolation and identification

For monitoring potentially unwanted applications on endpoints, which information is available on the FortiSASE software installations page?

A.

the vendor of the software

B.

the endpoint the software is installed on

C.

the license status of the software

D.

the usage frequency of the software

Refer to the exhibits.

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org.

Which configuration on FortiSASE is allowing users to perform the download?

A.

Web filter is allowing the URL.

B.

Deep inspection is not enabled.

C.

Application control is exempting all the browser traffic.

D.

Intrusion prevention is disabled.

Refer to the exhibit.

While reviewing the traffic logs, the FortiSASE administrator notices that the usernames are showing random characters.

Why are the usernames showing random characters?

A.

Log anonymization is turned on to hash usernames.

B.

Special characters are used in usernames.

C.

Users are using a shared single sign-on SSO username.

D.

FortiSASE uses FortiClient unique identifiers for usernames.

How does FortiSASE hide user information when viewing and analyzing logs?

A.

By tokenization in log data

B.

By masking log data

C.

By compressing log data

D.

By hashing log data

Which two settings are automatically pushed from FortiSASE to FortiClient in a new FortiSASE deployment with default settings? (Choose two.)

A.

zero trust network access (ZTNA) tags

B.

tunnel profile

C.

FortiSASE certificate authority (CA) certificate

D.

real-time protection

Which two of the following can release the network lockdown on the endpoint applied by FortiSASE? (Choose two.)\

A.

When the endpoint connects to the FortiSASE tunnel

B.

When the endpoint is determined as on-net

C.

When the endpoint is rebooted

D.

When the endpoint is determined as compliant using ZTNA tags

What are two benefits of deploying FortiSASE with FortiGate ZTNA access proxy? (Choose two.)

A.

It offers data center redundancy.

B.

The on-premises FortiGate performs a device posture check.

C.

It is ideal for latency-sensitive applications.

D.

It supports both agentless ZTNA and agent-based ZTNA.

Refer to the exhibit.

An endpoint is assigned an IP address of 192.168.13.101/24.

Which action will be run on the endpoint?

A.

The endpoint will be exempted from auto-connect to the FortiSASE tunnel.

B.

The endpoint will automatically connect to the FortiSASE tunnel.

C.

The endpoint will be detected as off-net.

D.

The endpoint will be able to bypass the on-net rule because it is connecting from a known subnet.