Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two components are part of onboarding a secure web gateway (SWG) endpoint? (Choose two)

A.

FortiSASE CA certificate

B.

proxy auto-configuration (PAC) file

C.

FortiSASE invitation code

D.

FortiClient installer

Refer to the exhibits.

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org.

Which configuration on FortiSASE is allowing users to perform the download? (Choose one answer)

A.

Deep inspection is not enabled.

B.

Application control is exempting all the browser traffic.

C.

Web filter is allowing the URL.

D.

Intrusion prevention is disabled.

Refer to the exhibits.

An endpoint is assigned an IP address of 192.168.13.101/24. Which action will be run on the endpoint? (Choose one answer)

A.

The endpoint will be able to bypass the on-net rule because it is connecting from a known subnet.

B.

The endpoint will be detected as off-net.

C.

The endpoint will be exempted from auto-connect to the FortiSASE tunnel.

D.

The endpoint will automatically connect to the FortiSASE tunnel.

When viewing the daily summary report generated by FortiSASE. the administrator notices that the report contains very little data. What is a possible explanation for this almost empty report?

A.

Digital experience monitoring is not configured.

B.

Log allowed traffic is set to Security Events for all policies.

C.

The web filter security profile is not set to Monitor

D.

There are no security profile group applied to all policies.

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.

In this scenario, which two setups will achieve these requirements? (Choose two answers)

A.

Configure ZTNA tags on FortiGate.

B.

Configure FortiGate as a zero trust network access (ZTNA) access proxy.

C.

Configure ZTNA servers and ZTNA policies on FortiGate.

D.

Configure private access policies on FortiSASE with ZTNA.

An organization wants to block all video and audio application traffic but grant access to videos from CNN Which application override action must you configure in the Application Control with Inline-CASB?

A.

Allow

B.

Pass

C.

Permit

D.

Exempt

What is the maximum number of Secure Private Access (SPA) service connections (SPA hubs) supported in the SPA use case? (Choose one answer)

A.

8

B.

12

C.

4

D.

16

Refer to the exhibit.

In the user connection monitor, the FortiSASE administrator notices the user name is showing random characters. Which configuration change must the administrator make to get proper user information?

A.

Turn off log anonymization on FortiSASE.

B.

Add more endpoint licenses on FortiSASE.

C.

Configure the username using FortiSASE naming convention.

D.

Change the deployment type from SWG to VPN.

Which three traffic flows are supported by FortiSASE Secure Private Access (SPA)? (Choose three answers)

A.

From private resources to FortiSASE agent-based users.

B.

From private resources to the internet.

C.

From agent-based users to private resources behind the Fortinet SD-WAN.

D.

From private resources to other private resources (SPA to SPA).

E.

From thin branches/branch on-ramp to private resources behind the Fortinet SD-WAN.

Which two benefits come from integrating SoCaaS with FortiSASE? (Choose two answers)

A.

Eliminates the need of endpoint projection software

B.

Continuous threat monitoring of all connected endpoints

C.

Centralized visibility of all threat events

D.

Provides bandwidth usage analytics