Lesson 13: Zero Trust Network Access (ZTNA) Quiz Answers
Question: Which type of information or object can be embedded in a ZTNA tag?
- Encrypted user ID and password
- Authentication token
- Client digital certificate
- Security posture of the device
Question: What is a benefit of the ZTNA access proxy?
- Limits connections to on-premises clients
- Simplifies network administration
- Protects servers and resources
- Accelerates speed throughput
Question: Which network device can function as a ZTNA access proxy?
- Router
- Authentication server
- Firewall
- Policy server
Question: Which statement best describes the zero-trust approach that is the basis for ZTNA design?
- After devices are authenticated, they are always trusted.
- IoT and BYOD devices must be authenticated before they are trusted.
- No device or user can be trusted inside or outside the network.
- Remote devices and users cannot be trusted.
Question: How does the ZTNA client identify itself to the ZTNA access proxy?
- Using a network user ID and password
- Using a digital certificate
- Using a MAC address
- Using device-specific information
Question: Which two objects does the FortiClient EMS server produce or can produce during ZTNA client registration? (Choose two.)
- Authentication token
- Tags
- Digital certificate
- One-time password