Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

In which three ways does FortiSASE help organizations ensure secure access for remote workers? (Choose three.)

A.

It enforces multi-factor authentication (MFA) to validate remote users.

B.

It secures traffic from endpoints to cloud applications.

C.

It uses the identity & access management (IAM) portal to validate the identities of remote workers.

D.

It offers zero trust network access (ZTNA) capabilities.

E.

It enforces granular access policies based on user identities.

Full Access
Question # 5

Which two advantages does FortiSASE bring to businesses with multiple branch offices? (Choose two.)

A.

It offers centralized management for simplified administration.

B.

It enables seamless integration with third-party firewalls.

C.

it offers customizable dashboard views for each branch location

D.

It eliminates the need to have an on-premises firewall for each branch.

Full Access
Question # 6

Which FortiSASE feature ensures least-privileged user access to all applications?

A.

secure web gateway (SWG)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin branch SASE extension

Full Access
Question # 7

An organization must block user attempts to log in to non-company resources while using Microsoft Office 365 to prevent users from accessing unapproved cloud resources.

Which FortiSASE feature can you implement to achieve this requirement?

A.

Web Filter with Inline-CASB

B.

SSL deep inspection

C.

Data loss prevention (DLP)

D.

Application Control with Inline-CASB

Full Access
Question # 8

Which two statements describe a zero trust network access (ZTNA) private access use case? (Choose two.)

A.

The security posture of the device is secure.

B.

All FortiSASE user-based deployments are supported.

C.

All TCP-based applications are supported.

D.

Data center redundancy is offered.

Full Access
Question # 9

Which of the following describes the FortiSASE inline-CASB component?

A.

It provides visibility for unmanaged locations and devices.

B.

It is placed directly in the traffic path between the endpoint and cloud applications.

C.

It uses API to connect to the cloud applications.

D.

It detects data at rest.

Full Access
Question # 10

When viewing the daily summary report generated by FortiSASE. the administrator notices that the report contains very little data. What is a possible explanation for this almost empty report?

A.

Digital experience monitoring is not configured.

B.

Log allowed traffic is set to Security Events for all policies.

C.

The web filter security profile is not set to Monitor

D.

There are no security profile group applied to all policies.

Full Access
Question # 11

Refer to the exhibit.

In the user connection monitor, the FortiSASE administrator notices the user name is showing random characters. Which configuration change must the administrator make to get proper user information?

A.

Turn off log anonymization on FortiSASE.

B.

Add more endpoint licenses on FortiSASE.

C.

Configure the username using FortiSASE naming convention.

D.

Change the deployment type from SWG to VPN.

Full Access
Question # 12

Which two components are part of onboarding a secure web gateway (SWG) endpoint? (Choose two)

A.

FortiSASE CA certificate

B.

proxy auto-configuration (PAC) file

C.

FortiSASE invitation code

D.

FortiClient installer

Full Access