Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibit.

Which two statements about the onboarding process shown in the exhibit are true? (Choose two answers)

A.

The user must manually select which FortiSASE components to install during the FortiClient setup.

B.

Depending on the installer used, the invitation code step may be skipped.

C.

The invitation code must always be entered manually after installing FortiClient.

D.

This is an email from the FortiSASE platform to an end user.

Which two statements about FortiSASE Geofencing with regional compliance are true? (Choose two answers)

A.

You can configure regional compliance on the security POP or the on-premises device, not both.1

B.

If no regional compliance rule is configured, the connection is made to the closest security POP.

C.

A regional compliance rule can connect only to an on-premises device or only to a security POP.2

D.

The connection order for a regional compliance rule is always the security POP first, followed by the on-premises device.

Refer to the exhibits.

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The VPN tunnel does not establish

Based on the provided configuration, what configuration needs to be modified to bring the tunnel up?

A.

NAT needs to be enabled in the Spoke-to-Hub firewall policy.

B.

The BGP router ID needs to match on the hub and FortiSASE.

C.

FortiSASE spoke devices do not support mode config.

D.

The hub needs IKEv2 enabled in the IPsec phase 1 settings.

What are two benefits of deploying secure private access (SPA) with SD-WAN? (Choose two answers)

A.

ZTNA posture check performed by the hub FortiGate

B.

Support of both TCP and UDP applications

C.

A direct access proxy tunnel from FortiClient to the on-premises FortiGate

D.

Inline security inspection by FortiSASE

Refer to the exhibits.

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The tunnel is up to the FortiGale hub. However, the administrator is not able to ping the webserver hosted behind the FortiGate hub.

Based on the output, what is the reason for the ping failures?

A.

The Secure Private Access (SPA) policy needs to allow PING service.

B.

Quick mode selectors are restricting the subnet.

C.

The BGP route is not received.

D.

Network address translation (NAT) is not enabled on the spoke-to-hub policy.

During FortiSASE provisioning, how many security points of presence (POPs) need to be configured by the FortiSASE administrator?

A.

3

B.

4

C.

2

D.

1

When configuring the DLP rule in FortiSASE using Regex format, what would be the correct order for the configuration steps? (Place the four correct steps in order)

When you configure FortiSASE Secure Private Access (SPA) with SD-WAN integration, you must establish a routing adjacency between FortiSASE and the FortiGate SD-WAN hub. Which routing protocol must you use?

A.

BGP

B.

IS-IS

C.

OSPF

D.

EIGRP

You are designing a new network, and the cybersecurity policy mandates that all remote users working from home must always be connected and protected. Which FortiSASE component facilitates this always-on security measure? (Choose one answer)

A.

Unified FortiClient

B.

SDWAN on-ramp2

C.

Secure web gateway

D.

Thin-branch SASE extension

You are configuring FortiSASE SSL deep inspection. What is required for FortiSASE to inspect encrypted traffic? (Choose one answer)

A.

FortiSASE uses a third-party CA certificate without importing it to client machines, and SSL deep inspection supports only web filtering and application control.

B.

FortiSASE acts as a root CA without needing a certificate, and SSL deep inspection is used only for split DNS and video filtering.

C.

FortiSASE requires an external CA to issue certificates to client machines, and SSL deep inspection supports only antivirus and file filter.

D.

FortiSASE acts as a certificate authority (CA) with a self-signed or internal CA certificate, requiring the root CA certificate to be imported into client machines.