Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which authentication method overrides any other previously configured user authentication on FortiSASE?

A.

MFA

B.

Local

C.

RADIUS

D.

SSO

A customer wants to upgrade their legacy on-premises proxy to a cloud-based proxy for a hybrid network.

Which two FortiSASE features would help the customer achieve this outcome? (Choose two.)

A.

secure web gateway (SWG)

B.

zero trust network access (ZTNA)

C.

sandbox cloud

D.

inline-CASB

Which two advantages does FortiSASE bring to businesses with microbranch offices that have FortiAP deployed for unmanaged devices? (Choose two.)

A.

It secures internet access both on and off the network.

B.

It uses zero trust network access (ZTNA) tags to perform device compliance checks.

C.

It eliminates the requirement for an on-premises firewall.

D.

It simplifies management and provisioning.

In the Secure Private Access (SPA) use case, which two FortiSASE features facilitate access to corporate applications? (Choose two.)

A.

cloud access security broker (CASB)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin edge

In a FortiSASE SD-WAN deployment with dual hubs, what are two benefits of assigning hubs with different priorities? (Choose two.)

A.

optimized performance that meets the minimum SLA requirements

B.

load balancing based on session identification

C.

bandwidth allocated traffic shaping

D.

redundancy to seamlessly steer traffic

Which two of the following can release the network lockdown on the endpoint applied by FortiSASE? (Choose two.)\

A.

When the endpoint connects to the FortiSASE tunnel

B.

When the endpoint is determined as on-net

C.

When the endpoint is rebooted

D.

When the endpoint is determined as compliant using ZTNA tags

Refer to the exhibits.

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download theeicar.com-zipfile fromhttps://eicar.org.

Which configuration on FortiSASE is allowing users to perform the download?

A- Web filter is allowing the URL.

B. Deep inspection is not enabled.

C. Application control is exempting all the browser traffic.

D. Intrusion prevention is disabled.

Refer to the exhibit.

While reviewing the traffic logs, the FortiSASE administrator notices that the usernames are showing random characters.

Why are the usernames showing random characters?

A.

Log anonymization is turned on to hash usernames.

B.

Special characters are used in usernames.

C.

Users are using a shared single sign-on SSO username.

D.

FortiSASE uses FortiClient unique identifiers for usernames.

How does FortiSASE hide user information when viewing and analyzing logs?

A.

By tokenization in log data

B.

By masking log data

C.

By compressing log data

D.

By hashing log data

What are two advantages of using zero-trust tags? (Choose two.)

A.

Zero-trust tags can determine the security posture of an endpoint.

B.

Zero-trust tags can be assigned to endpoint profiles based on user groups.

C.

Zero-trust tags can be used to allow or deny access to network resources.

D.

Zero-trust tags can help monitor endpoint system resource usage.