Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which statement about security posture tags in FortiSASE is correct?

A.

Multiple tags can be assigned to an endpoint, but only one is used for evaluation.

B.

Multiple tags can be assigned to an endpoint and used for evaluation.

C.

Tags are static and do not change with endpoint status.

D.

Only one tag can be assigned to an endpoint.

Which three reports are valid report types in FortiSASE? (Choose three.)

A.

Web Usage Summary Report

B.

Endpoint Compliance Deviation Report

C.

Vulnerability Assessment Report

D.

Shadow IT Report

E.

Cyber Threat Assessment

Which FortiSASE feature monitors SaaS application performance and connectivity to points of presence (POPs)?

A.

Operations widgets

B.

FortiView dashboards

C.

Event logs

D.

Digital experience monitoring

Which three authentication sources support secure identity verification and access control for FortiSASE remote users? (Choose three.)

A.

Security Assertion Markup Language (SAML)

B.

OpenID Conned (OIDC)

C.

Lightweight Directory Access Protocol (LDAP)

D.

Terminal Access Controller Access-Control System Plus (TACACS+)

E.

Remote Authentication Dial-in User Service (RADIUS)

For a small site, an administrator plans to implement SD-WAN and ensure high network availability for business-critical applications while limiting the overall cost and the cost of pay-per-use backup connections.

Which action must the administrator take to accomplish this plan?

A.

Use a mid-range FortiGate device to implement standalone SD-WAN.

B.

Implement dynamic routing.

C.

Set up a high availability (HA) cluster to implement standalone SD-WAN.

D.

Configure at least two WAN links.

What is the purpose of the on/off-net rule setting in FortiSASE?

A.

To enable or disable user authentication for external network access.

B.

To define different traffic routing rules for on-premises and cloud-based resources.

C.

To determine if an endpoint is connecting from a trusted network or untrusted location.

D.

To configure different access policies for users based on their geographical location.

Refer to the exhibit.

You want the performance service-level agreement (SLA) to measure the jitter of each member. Which configuration change must you make to achieve this result?

A.

No change is required.

B.

Add an SLA target and define a jitter threshold.

C.

Specify the participant members.

D.

Set the protocol to HTTP.

Which two delivery methods are used for installing FortiClient on a user's laptop? (Choose two.)

A.

Use zero-touch installation through a third-party application store.

B.

Download the installer directly from the FortiSASE portal.

C.

Send an invitation email to selected users containing links to FortiClient installers.

D.

Configure automatic installation through an API to the user's laptop.

Refer to the exhibits.

The administrator increases the member priority on port2 to 20. Upon configuration changes and the receipt of new packets, which two actions does FortiGate perform on existing sessions established over port2? (Choose two.)

A.

FortiGate updates the gateway information of the sessions with SNAT so that they use port1 instead of port2.

B.

FortiGate flags the SNAT session as dirty only if the administrator has assigned an IP pool to the firewall policies with NAT.

C.

FortiGate routes only new sessions over port1.

D.

FortiGate continues routing all existing sessions over port2.

E.

FortiGate flags the sessions as dirty.

SD-WAN interacts with many other FortiGate features. Some of them are required to allow SD-WAN to steer the traffic.

Which three configuration elements must you configure before FortiGate can steer traffic according to SD-WAN rules? (Choose three.)

A.

Firewall policies

B.

Security profiles

C.

Interfaces

D.

Routing

E.

Traffic shaping