[Certification]/[FCF] Fortinet Certified Fundamentals

[FCF] Cybersecurity 2.0 - Lesson 13 : Zero Trust Network Access (ZTNA) (Quesion&Answer)

starterr 2024. 5. 19. 15:42

Q. Which network device can function as a ZTNA access proxy?
Select one:

- Authentication server
- Policy server
- Firewall
- Router


Q. Which statement best describes the zero-trust approach that is the basis for ZTNA design?
Select one:

- No device or user can be trusted inside or outside the network.
- IoT and BYOD devices must be authenticated before they are trusted.
- After devices are authenticated, they are always trusted.
- Remote devices and users cannot be trusted.


Q. Which type of information or object can be embedded in a ZTNA tag?
Select one:

- Client digital certificate
- Authentication token
- Security posture of the device
- Encrypted user ID and password


Q. Which two objects does the FortiClient EMS server produce or can produce during ZTNA client registration? (Choose two.)
Select one or more:

- Tags
- Digital certificate
- One-time password
- Authentication token

 

반응형



Q. What is a benefit of the ZTNA access proxy?
Select one:

- Simplifies network administration
- Limits connections to on-premises clients
- Accelerates speed throughput
- Protects servers and resources


Q How does the ZTNA client identify itself to the ZTNA access proxy?
Select one:

- Using a digital certificate
- Using a network user ID and password
- Using device-specific information
- Using a MAC address

 

 

[FCF] Cybersecurity 2.0 - Lesson 13 : Zero Trust Network Access (ZTNA)

 

[FCF] Cybersecurity 2.0 - Lesson 13 : Zero Trust Network Access (ZTNA)

A.  ZTNA 개요1. ZTNA 란? ZTNA는 최종 엔터티와 네트워크 사이에 보안 세션을 설정하는 동시에 최종 엔터티나 네트워크의 위치에 관계없이 리소스에 대한 액세스를 세밀하게 제어하고 제로 트러스

infoofit.tistory.com

 

[FCF] Cybersecurity 2.0 - Lesson 14 : Cloud Service Models (Quesion&Answer)

 

[FCF] Cybersecurity 2.0 - Lesson 14 : Cloud Service Models (Quesion&Answer)

Q. Complete the sentence. Cloud computing is the practice of Select one: - building LANs comprised of virtual servers and connected by routers to form a virtual WAN. - connecting various computers and other network devices together usin

infoofit.tistory.com

 

 

반응형