Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which statement describes the FortiGuard forensics analysis feature on FortiSASE?

A.

It can help troubleshoot user-to-application performance issues.

B.

It can help customers identify and mitigate potential risks to their network.

C.

It can monitor endpoint resources in real-time.

D.

It is a 24x7x365 monitoring service of your FortiSASE environment.

Full Access
Question # 5

When accessing the FortiSASE portal for the first time, an administrator must select data center locations for which three FortiSASE components? (Choose three.)

A.

Endpoint management

B.

Points of presence

C.

SD-WAN hub

D.

Logging

E.

Authentication

Full Access
Question # 6

Refer to the exhibits.

When remote users connected to FortiSASE require access to internal resources on Branch-2. how will traffic be routed?

A.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2. which will then route traffic to Branch-2.

B.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a static route

C.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1, which will then route traffic to Branch-2.

D.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route

Full Access
Question # 7

When viewing the daily summary report generated by FortiSASE. the administrator notices that the report contains very little data. What is a possible explanation for this almost empty report?

A.

Digital experience monitoring is not configured.

B.

Log allowed traffic is set to Security Events for all policies.

C.

The web filter security profile is not set to Monitor

D.

There are no security profile group applied to all policies.

Full Access
Question # 8

Which two additional components does FortiSASE use for application control to act as an inline-CASB? (Choose two.)

A.

intrusion prevention system (IPS)

B.

SSL deep inspection

C.

DNS filter

D.

Web filter with inline-CASB

Full Access
Question # 9

Which secure internet access (SIA) use case minimizes individual endpoint configuration?

A.

Site-based remote user internet access

B.

Agentless remote user internet access

C.

SIA for SSL VPN remote users

D.

SIA using ZTNA

Full Access
Question # 10

You are designing a new network for Company X and one of the new cybersecurity policy requirements is that all remote user endpoints must always be connected and protected Which FortiSASE component facilitates this always-on security measure?

A.

site-based deployment

B.

thin-branch SASE extension

C.

unified FortiClient

D.

inline-CASB

Full Access
Question # 11

Which secure internet access (SIA) use case minimizes individual workstation or device setup, because you do not need to install FortiClient on endpoints or configure explicit web proxy settings on web browser-based end points?

A.

SIA for inline-CASB users

B.

SIA for agentless remote users

C.

SIA for SSLVPN remote users

D.

SIA for site-based remote users

Full Access
Question # 12

Refer to the exhibits.

WiMO-Pro and Win7-Pro are endpoints from the same remote location. WiMO-Pro can access the internet though FortiSASE, while Wm7-Pro can no longer access the internet

Given the exhibits, which reason explains the outage on Wm7-Pro?

A.

The Win7-Pro device posture has changed.

B.

Win7-Pro cannot reach the FortiSASE SSL VPN gateway

C.

The Win7-Pro FortiClient version does not match the FortiSASE endpoint requirement.

D.

Win-7 Pro has exceeded the total vulnerability detected threshold.

Full Access
Question # 13

Which two statements describe a zero trust network access (ZTNA) private access use case? (Choose two.)

A.

The security posture of the device is secure.

B.

All FortiSASE user-based deployments are supported.

C.

All TCP-based applications are supported.

D.

Data center redundancy is offered.

Full Access