Q. Which network device can function as a ZTNA access proxy?
Select one:
- Authentication server
- Policy server
- Firewall
- Router
Q. Which statement best describes the zero-trust approach that is the basis for ZTNA design?
Select one:
- No device or user can be trusted inside or outside the network.
- IoT and BYOD devices must be authenticated before they are trusted.
- After devices are authenticated, they are always trusted.
- Remote devices and users cannot be trusted.
Q. Which type of information or object can be embedded in a ZTNA tag?
Select one:
- Client digital certificate
- Authentication token
- Security posture of the device
- Encrypted user ID and password
Q. Which two objects does the FortiClient EMS server produce or can produce during ZTNA client registration? (Choose two.)
Select one or more:
- Tags
- Digital certificate
- One-time password
- Authentication token
Q. What is a benefit of the ZTNA access proxy?
Select one:
- Simplifies network administration
- Limits connections to on-premises clients
- Accelerates speed throughput
- Protects servers and resources
Q How does the ZTNA client identify itself to the ZTNA access proxy?
Select one:
- Using a digital certificate
- Using a network user ID and password
- Using device-specific information
- Using a MAC address
[FCF] Cybersecurity 2.0 - Lesson 13 : Zero Trust Network Access (ZTNA)
[FCF] Cybersecurity 2.0 - Lesson 14 : Cloud Service Models (Quesion&Answer)