Refer to the exhibits.


Jumpbox and Windows-AD are endpoints from the same remote location. Jumpbox can access the
internet through FortiSASE, while Windows-AD can no longer access the internet.
Based on the information in the exhibits, which reason explains the outage on Windows-AD?
C
Explanation:
The Windows-AD endpoint now has both "FortiSASE-Compliant" and "FortiSASE-Non-Compliant"
tags due to failing the antivirus software check. As a result, the Secure Internet Access Policy matches
the "Non-Compliant" rule, which is set to Deny, causing the device to lose internet access.
Which description of the FortiSASE inline-CASB component is true?
B
Explanation:
FortiSASE inline-CASB operates in the traffic path to provide real-time visibility and control over data
in motion as it is transmitted to and from cloud applications.
Which authentication method overrides any other previously configured user authentication on
FortiSASE?
D
Explanation:
Single Sign-On (SSO) overrides any other previously configured user authentication method on
FortiSASE, taking precedence for user authentication.
What are two advantages of using zero-trust tags? (Choose two.)
A,C
Explanation:
Zero-trust tags assess endpoint compliance based on defined posture rules and are used in access
policies to control whether a device is permitted or denied access to specific network resources.
Which FortiSASE feature ensures least-privileged user access to corporate applications that are
protected by an on-premises FortiGate device?
B
Explanation:
ZTNA enforces least-privileged access by verifying user identity and device posture before granting
access to specific corporate applications, even when protected by an on-premises FortiGate.
A company must provide access to a web server through FortiSASE secure private access for
contractors.
What is the recommended method to provide access?
C
Explanation:
The bookmark portal is the recommended method for providing contractors access to private web
applications through FortiSASE Secure Private Access, as it offers a user-friendly, secure, and
controlled access mechanism without requiring full network connectivity.
Your FortiSASE customer has a small branch office in which ten users will be using their personal
laptops and mobile devices to access the internet.
Which deployment should they use to secure their internet access with minimal configuration?
B
Explanation:
Deploying FortiAP enables secure internet access for unmanaged personal devices in small branch
offices with minimal configuration by automatically directing traffic through FortiSASE, eliminating
the need for endpoint installation or complex setup.
Which information does FortiSASE use to bring network lockdown into effect on an endpoint?
C
Explanation:
FortiSASE uses ZTNA tags to assess the endpoint’s security posture. If the posture is non-compliant
based on predefined rules, FortiSASE enforces network lockdown to restrict access accordingly.
For monitoring potentially unwanted applications on endpoints, which information is available on
the FortiSASE software installations page?
B
Explanation:
The FortiSASE software installations page shows which endpoints have specific software installed,
allowing administrators to monitor potentially unwanted applications across the network.
What is the recommended method to upgrade FortiClient in a FortiSASE deployment?
C
Explanation:
In FortiSASE, the recommended method to upgrade FortiClient is to configure an endpoint upgrade
rule and assign it to specific endpoint groups. This ensures controlled and automated upgrades
across managed devices.