Which three features does FortiClient endpoint security include? (Choose three.)

Which three features does FortiClient endpoint security include? (Choose three.)A . L2TP B. Real-time protection C. DLP D. Vulnerability management E. IPsecView AnswerAnswer: B, D, E

January 30, 2023 No Comments READ MORE +

Which two statements are true about ZTNA? (Choose two.)

Which two statements are true about ZTNA? (Choose two.)A . ZTNA provides role-based access B. ZTNA manages access for remote users only C. ZTNA manages access through the client only D. ZTNA provides a security posture checkView AnswerAnswer: B

January 28, 2023 No Comments READ MORE +

Which statement is true about the firewall policy?

An administrator configures ZTNA configuration on the FortiGate for remote users. Which statement is true about the firewall policy?A . It enforces access control B. It redirects the client request to the access proxy C. It defines the access proxy D. It applies security profiles to protect trafficView AnswerAnswer: B...

January 28, 2023 No Comments READ MORE +

Which component is responsible for enforcing protection and checking security posture?

An administrator installs FortiClient EMS in the enterprise. Which component is responsible for enforcing protection and checking security posture?A . FortiClient vulnerability scan B. FortiClient EMS tags C. FortiClient EMS D. FortiClientView AnswerAnswer: D

January 26, 2023 No Comments READ MORE +

Based on the FortiClient log details shown in the exhibit, which two statements are true?

Refer to the exhibit. Based on the FortiClient log details shown in the exhibit, which two statements are true? (Choose two.)A . The filename is Unconfirmed   899290 .crdownload. B. The file status is Quarantined C. The filename is sent to ForuSandbox for further inspection. D. The file location IS ??D:Users.View...

January 22, 2023 No Comments READ MORE +

Based on the settings shown in the exhibit, which two actions must the administrator take to make the endpoint compliant?

Refer to the exhibit. Based on the settings shown in the exhibit, which two actions must the administrator take to make the endpoint compliant? (Choose two.)A . Enable the webfilter profile B. Integrate FortiSandbox for infected file analysis C. Patch applications that have vulnerability rated as high or above D....

January 21, 2023 No Comments READ MORE +

Which FortiGate feature is required m addition to ZTNA?

An administrator has a requirement to add user authentication to the ZTNA access for remote or off-fabric users. Which FortiGate feature is required m addition to ZTNA?A . FortiGate FSSO B. FortiGate certificates C. FortiGate explicit proxy D. FortiGate endpoint controlView AnswerAnswer: C

January 21, 2023 No Comments READ MORE +

Based on the configuration, what will happen when someone logs in with the user account student on an endpoint in the training AD domain?

Refer to the exhibits. Which shows the configuration of endpoint policies. Based on the configuration, what will happen when someone logs in with the user account student on an endpoint in the training AD domain?A . FortiClient EMS will assign the Sales policy B. FortiClient EMS will assign the Training...

January 20, 2023 No Comments READ MORE +

Which Fortinet device will enforce compliance with dynamic access control?

A FortiClient EMS administrator has enabled the compliance rule for the sales department. Which Fortinet device will enforce compliance with dynamic access control?A . FortiClient B. FortiClient EMS C. FortiGate D. FortiAnalyzerView AnswerAnswer: C

January 19, 2023 No Comments READ MORE +

What action does FortiClient anti-exploit detection take when it detects exploits?

What action does FortiClient anti-exploit detection take when it detects exploits?A . Terminates the compromised application process B. Blocks memory allocation to the compromised application process C. Patches the compromised application process D. Deletes the compromised application processView AnswerAnswer: A

January 19, 2023 No Comments READ MORE +