Refer to the exhibit.
A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.
In this scenario, which two setups will achieve these requirements? (Choose two.)
Answer : A, B
To enforce device posture checks and ensure that TCP traffic flows through FortiGate, the FortiGate must act as a ZTNA access proxy and host the ZTNA servers and policies. This setup allows posture validation via FortiSASE while routing traffic securely to protected servers through FortiGate.
Which information can an administrator monitor using reports generated on FortiSASE?
Answer : A
FortiSASE reporting provides visibility into the usage of sanctioned and unsanctioned SaaS applications, enabling administrators to monitor cloud application activity and enforce security policies.
What are two advantages of using zero-trust tags? (Choose two.)
Answer : A, C
Zero-trust tags assess endpoint compliance based on defined posture rules and are used in access policies to control whether a device is permitted or denied access to specific network resources.
Which secure internet access (SIA) use case minimizes individual endpoint configuration?
Answer : B
Site-based remote user internet access minimizes individual endpoint configuration by routing user traffic through a centralized FortiSASE connection point (such as a FortiAP or FortiGate), rather than requiring each device to be individually configured with the FortiClient agent.
Which statement best describes the Digital Experience Monitor (DEM) feature on FortiSASE?
Answer : A
The Digital Experience Monitor (DEM) in FortiSASE measures and monitors network performance from the FortiSASE Points of Presence (PoPs) to specific SaaS or cloud applications, helping identify and troubleshoot performance issues across the service path.
What happens to the logs on FortiSASE that are older than the configured log retention period?
Answer : A
Once the configured log retention period expires, FortiSASE automatically deletes the older logs to free up storage and maintain compliance with retention policies.
In a FortiSASE secure web gateway (SWG) deployment, which two features protect against web-based threats? (Choose two.)
Answer : A, B
SSL deep inspection allows FortiSASE to analyze encrypted web traffic for threats, while malware protection with sandboxing detects and blocks malicious files delivered through web channels.