Fortinet NSE 7 - Zero Trust Access 7.2 NSE7_ZTA-7.2 Exam Questions

Page: 1 / 14
Total 30 questions
Question 1

Exhibit.

An administrator has to provide on-fabric clients with access to FortiAnalyzer using ZTNA tags

Which two conditions must be met to achieve this task? (Choose two.)



Answer : A, B

For on-fabric clients to access FortiAnalyzer using ZTNA tags, the following conditions must be met:

A) The on-fabric client should have FortiGate as its default gateway: This is essential to ensure that all client traffic is routed through FortiGate, where ZTNA policies can be enforced.

B) The ZTNA server must be configured on FortiGate: For ZTNA tags to be effectively used, the ZTNA server, which processes and enforces these tags, must be configured on the FortiGate appliance.


Configuring ZTNA tags and tagging rules

Synchronizing FortiClient ZTNA tags

FortiAnalyzer

Technical Tip: ZTNA Tags fail to synchronize between FortiClient and FortiGate

Question 2

Which method is used to install passive agent on an endpoint?



Answer : D

The method used to install a passive agent on an endpoint is:

D) Installed by user or deployment tools: Passive agents are typically installed on endpoints either manually by users or automatically through deployment tools used by the organization.

The other options do not accurately describe the installation of passive agents:

A) Deployed by using a login/logout script: This is not the standard method for deploying passive agents.

B) Agent is downloaded from Playstore: This is more relevant for mobile devices and does not represent the general method for passive agent installation.

C) Agent is downloaded and run from captive portal: This method is not typically used for installing passive agents.


FortiNAC Agent Deployment Guide.

Installation Methods for Passive Agents in FortiNAC.

Question 3

What are the three core principles of ZTA? (Choose three.)



Answer : A, D, E

Zero Trust Architecture (ZTA) is a security model that follows the philosophy of ''never trust, always verify'' and does not assume any implicit trust for any entity within or outside the network perimeter. ZTA is based on a set of core principles that guide its implementation and operation. According to the NIST SP 800-207, the three core principles of ZTA are:

A) Verify and authenticate. This principle emphasizes the importance of strong identification and authentication for all types of principals, including users, devices, and machines. ZTA requires continuous verification of identities and authentication status throughout a session, ideally on each request. It does not rely solely on traditional network location or controls. This includes implementing modern strong multi-factor authentication (MFA) and evaluating additional environmental and contextual signals during authentication processes.

D) Least privilege access. This principle involves granting principals the minimum level of access required to perform their tasks. By adopting the principle of least privilege access, organizations can enforce granular access controls, so that principals have access only to the resources necessary to fulfill their roles and responsibilities. This includes implementing just-in-time access provisioning, role-based access controls (RBAC), and regular access reviews to minimize the surface area and the risk of unauthorized access.

E) Assume breach. This principle assumes that the network is always compromised and that attackers can exploit any vulnerability or weakness. Therefore, ZTA adopts a proactive and defensive posture that aims to prevent, detect, and respond to threats in real-time. This includes implementing micro-segmentation, end-to-end encryption, and continuous monitoring and analytics to restrict unnecessary pathways, protect sensitive data, and identify anomalies and potential security events.


1: Understanding Zero Trust principles - AWS Prescriptive Guidance

2: Zero Trust Architecture - NIST

Question 4
Question 5

exhibit.

User student is not able to log in to SSL VPN

Given the output showing a real-time debug: which statement describes the login failure?



Answer : C

Given the output showing a real-time debug, the statement that describes the login failure is:

C) student is not part of the usergroup SSL_VPN_Users: The debug log contains a line that says 'fnbam_cert_check_group_list-checking group with name 'SSL_VPN_Users'' followed by 'peer_check_add_peer_check_student' and later 'RDN_match-Checking 'CN' val 'STUDENT' -- no match.' This suggests that the certificate presented has a common name (CN) of 'student', which does not match or is not authorized under the 'SSL_VPN_Users' group expected for successful authentication.


Question 6
Question 7

Which three statements are true about zero-trust telemetry compliance1? (Choose three.)



Answer : A, B, D

In the context of zero-trust telemetry compliance, the three true statements are:

A) FortiClient EMS creates dynamic policies using ZTNA tags: FortiClient EMS utilizes ZTNA (Zero Trust Network Access) tags to create dynamic policies based on the telemetry it receives from endpoints.

B) FortiClient checks the endpoint using the ZTNA tags provided by FortiClient EMS: FortiClient on the endpoint uses the ZTNA tags from FortiClient EMS to determine compliance with the specified security policies.

D) FortiOS provides network access to the endpoint based on the zero-trust tagging rules: FortiOS, the operating system running on FortiGate devices, uses the zero-trust tagging rules to make decisions on network access for endpoints.

The other options are not accurate in this context:

C) ZTNA tags are configured in FortiClient, based on criteria such as certificates and the logged-in domain: ZTNA tags are typically configured and managed in FortiClient EMS, not directly in FortiClient.

E) FortiClient EMS sends the endpoint information received through FortiClient Telemetry to FortiOS: While FortiClient EMS does process telemetry data, the direct sending of endpoint information to FortiOS is not typically described in this manner.


Zero Trust Telemetry in Fortinet Solutions.

FortiClient EMS and FortiOS Integration for ZTNA.

Page:    1 / 14   
Total 30 questions