Wednesday , October 30 2024

Zero Trust Access Quiz Answers – NSE 3 Fortinet

Zero Trust Access Quiz Answers – NSE 3 Fortinet

Question 1: How does FortiNAC dynamically control access to the network?

  • Detects a change in the device profile and automatically quarantines the device
  • Connects devices securely using ZTNA technology or VPN SSL
  • Authenticates devices using MFA before allowing access to the network
  • Authorizes access to network resources based on user or device roles

Question 2: Which best describes the Zero Trust Access solution pillar?

  • Applies artificial intelligence as well as integration and automation to reduce risk and improve efficiency
  • Orchestrates and automates all of an organization’s security tools to unify operations
  • Secures edges at any scale with full visibility and threat protection
  • Enables organizations to see and control everyone and everything on the network

Question 3: Which description best identifies a function of FortiAuthenticator as a certificate authority?

  • Verify data integrity of VPN connections
  • Track access to network resources
  • Provide digital identities
  • Block unauthorized access to network resources

Question 4: Which two Fortinet products integrate with FortiNAC? (Choose two.)

  • FortiPhone
  • FortiToken
  • FortiClient EMS
  • FortiGate

Question 5: Which three key capabilities does FortiNAC offer customers? (Choose three.)

  • Control—segments the network by device so that the device can only access those assets it requires
  • Automated response—takes automatic action should a device become compromised or be suspected of compromise
  • Filtration—filters web traffic and stops any known malware
  • Visibility—provides identification, profiling, and vulnerability scanning of devices
  • Malware containment and analysis—isolates a suspicious application in a virtual environment for further testing

Question 6: Which product helps protect end users who are prone to clicking on phishing scams?

  • FortiNAC
  • FortiAnalyzer
  • FortiAuthenticator
  • FortiClient

Question 7: Which two methods are common examples of second factor authentication that are supported by FortiAuthenticator? (Choose two.)

  • Voice biometrics
  • Digital certificates
  • Retina scan
  • Tokens

Question 8: Which product category best describes FortiAuthenticator?

  • Monitoring and Reporting
  • Analytics
  • Certificate Directory
  • Identity Management

Question 9: Complete the sentence to identify which method determines Fortinet ZTA micro-segmentation. FortiNAC micro-segments the network according to …

  • user role and device function.
  • internal and guest users.
  • subnet mask and IP address.
  • trusted and untrusted entities.

Question 10: Which type of network user accounts for the majority of breaches?

  • Partners
  • External users
  • IT administrators
  • Internal users

Question 11: Which is a principle of zero trust access?

  • Protection from spoofing and routing attacks
  • Continuous authentication of users and devices
  • Multi-factor authentication
  • Restoration of a device to a previous state after ransomware has been detected

Question 12: Which three major functions does FortiAuthenticator provide? (Choose three.)

  • Secure access with two-factor authentication
  • Malware detection and remediation
  • Identity management
  • Wired and wireless authentication
  • Scalable VPN through custom FortiASIC hardware acceleration

Question 13: FortiAuthenticator supports self-service registration, social authentication, and pre-defined access codes for which purpose?

  • Two-factor sign-on
  • Guest user access
  • FortiGate administrative access
  • Malware detection

Question 14: What is a key capability of FortiNAC?

  • Blocks traffic when the source of the traffic exceeds a prescribed threshold
  • Profiles and monitors devices on the network
  • Authorizes access to resources based on device profiles
  • Segments the network according to device IP address

Question 15: Which module of FortiClient supports the secure remote access use case?

  • Single Sign On
  • Advanced Threat Protection
  • Endpoint Protection Platform
  • Fabric Agent

Question 16: Which security platform does FortiClient EMS integrate with to increase visibility and compliance control?

  • Fortinet Security Fabric
  • Certificate Authority
  • Firestorm Security Platform for FortiClient
  • SD-WAN

Question 17: Which Fortinet product is used to profile devices in order to detect changes to device characteristics?

  • FortiSandbox
  • FortiAuthenticator
  • FortiClient
  • FortiNAC

Question 18: Which product can manage and automatically provision FortiClient to endpoints?

  • FortiGate
  • Endpoint Management Server
  • FortiManager
  • FortiClient Fabric Agent

About Machine Learning

Check Also

Linux Server Administration FREE Certification

Linux Server Administration Certification

Linux Server Administration FREE Certification Linux server administration involves managing and maintaining Linux-based servers to …

Leave a Reply

Your email address will not be published. Required fields are marked *