ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 1 - FCSS_SASE_AD-23 discussion

Report
Export

What are two advantages of using zero-trust tags? (Choose two.)

A.
Zero-trust tags can be used to allow or deny access to network resources
Answers
A.
Zero-trust tags can be used to allow or deny access to network resources
B.
Zero-trust tags can determine the security posture of an endpoint.
Answers
B.
Zero-trust tags can determine the security posture of an endpoint.
C.
Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints
Answers
C.
Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints
D.
Zero-trust tags can be used to allow secure web gateway (SWG) access
Answers
D.
Zero-trust tags can be used to allow secure web gateway (SWG) access
Suggested answer: A, B

Explanation:

Zero-trust tags are critical in implementing zero-trust network access (ZTNA) policies. Here are the two key advantages of using zero-trust tags:

Access Control (Allow or Deny):

Zero-trust tags can be used to define policies that either allow or deny access to specific network resources based on the tag associated with the user or device.

This granular control ensures that only authorized users or devices with the appropriate tags can access sensitive resources, thereby enhancing security.

Determining Security Posture:

Zero-trust tags can be utilized to assess and determine the security posture of an endpoint.

Based on the assigned tags, FortiSASE can evaluate the device's compliance with security policies, such as antivirus status, patch levels, and configuration settings.

Devices that do not meet the required security posture can be restricted from accessing the network or given limited access.

FortiOS 7.2 Administration Guide: Provides detailed information on configuring and using zero-trust tags for access control and security posture assessment.

FortiSASE 23.2 Documentation: Explains how zero-trust tags are implemented and used within the FortiSASE environment for enhancing security and compliance.

asked 18/09/2024
Kefash White
38 questions
NextNext
User
Your answer:
0 comments
Sorted by

Leave a comment first