Fortinet Getting Started in Cybersecurity Zero Trust Network Access (ZTNA) Quiz Answers

Lesson 13: Zero Trust Network Access (ZTNA) Quiz Answers

Question: Which type of information or object can be embedded in a ZTNA tag?

  • Encrypted user ID and password
  • Authentication token
  • Client digital certificate
  • Security posture of the device

Question: What is a benefit of the ZTNA access proxy?

  • Limits connections to on-premises clients
  • Simplifies network administration
  • Protects servers and resources
  • Accelerates speed throughput

Question: Which network device can function as a ZTNA access proxy?

  • Router
  • Authentication server
  • Firewall
  • Policy server

Question: Which statement best describes the zero-trust approach that is the basis for ZTNA design?

  • After devices are authenticated, they are always trusted.
  • IoT and BYOD devices must be authenticated before they are trusted.
  • No device or user can be trusted inside or outside the network.
  • Remote devices and users cannot be trusted.

Question: How does the ZTNA client identify itself to the ZTNA access proxy?

  • Using a network user ID and password
  • Using a digital certificate
  • Using a MAC address
  • Using device-specific information

Question: Which two objects does the FortiClient EMS server produce or can produce during ZTNA client registration? (Choose two.)

  • Authentication token
  • Tags
  • Digital certificate
  • One-time password

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.