Fortinet Getting Started in Cybersecurity Zero Trust Network Access (ZTNA) 

Question: Which type of information or object can be embedded in a ZTNA tag?

Question: What is a benefit of the ZTNA access proxy?

Question: Which network device can function as a ZTNA access proxy?

Question: Which statement best describes the zero-trust approach that is the basis for ZTNA design?

Question: How does the ZTNA client identify itself to the ZTNA access proxy?

Question: Which two objects does the FortiClient EMS server produce or can produce during ZTNA client registration? (Choose two.)


Question: Which type of information or object can be embedded in a ZTNA tag?

Question: What is a benefit of the ZTNA access proxy?

Question: Which network device can function as a ZTNA access proxy?

Question: Which statement best describes the zero-trust approach that is the basis for ZTNA design?

Question: How does the ZTNA client identify itself to the ZTNA access proxy?

Question: Which two objects does the FortiClient EMS server produce or can produce during ZTNA client registration? (Choose two.)


Question 1: How does FortiNAC dynamically control access to the network?

Question 2: Which best describes the Zero Trust Access solution pillar?

Question 3: Which description best identifies a function of FortiAuthenticator as a certificate authority?

Question 4: Which two Fortinet products integrate with FortiNAC? (Choose two.)

Question 5: Which three key capabilities does FortiNAC offer customers? (Choose three.)

Question 6: Which product helps protect end users who are prone to clicking on phishing scams?

Question 7: Which two methods are common examples of second factor authentication that are supported by FortiAuthenticator? (Choose two.)

Question 8: Which product category best describes FortiAuthenticator?

Question 9: Complete the sentence to identify which method determines Fortinet ZTA micro-segmentation. FortiNAC micro-segments the network according to …

Question 10: Which type of network user accounts for the majority of breaches?

Question 11: Which is a principle of zero trust access?

Question 12: Which three major functions does FortiAuthenticator provide? (Choose three.)

Question 13: FortiAuthenticator supports self-service registration, social authentication, and pre-defined access codes for which purpose?

Question 14: What is a key capability of FortiNAC?

Question 15: Which module of FortiClient supports the secure remote access use case?

Question 16: Which security platform does FortiClient EMS integrate with to increase visibility and compliance control?

Question 17: Which Fortinet product is used to profile devices in order to detect changes to device characteristics?

Question 18: Which product can manage and automatically provision FortiClient to endpoints?