Text Material Preview
NSE7_ZTA-7.2 Real Dumps https://www.certspots.com/exam/nse7_zta-7-2/ Fortinet NSE7_ZTA-7.2 Real Dumps 1. Which three statements are true about zero-trust telemetry compliance? (Choose three.) A.FortiClient EMS creates dynamic policies using ZTNA tags B.FortiClient checks the endpoint using the ZTNA tags provided by FortiClient EMS C.ZTNA tags are configured in FortiClient, based on criteria such as certificates and the logged in domain D.FortiOS provides network access to the endpoint based on the zero-trust tagging rules E.FortiClient EMS sends the endpoint information received through FortiClient Telemetry to FortiOS Answer: A, B, D Fortinet NSE7_ZTA-7.2 Real Dumps 2. Which three statements are true about a persistent agent? (Choose three.) A.Agent is downloaded and run from captive portal B.Supports advanced custom scans and software inventory. C.Can apply supplicant configuration to a host D.Deployed by a login/logout script and is not installed on the endpoint E.Can be used for automatic registration and authentication Answer: B, C, E Fortinet NSE7_ZTA-7.2 Real Dumps 3. In which FortiNAC configuration stage do you define endpoint compliance? A.Device onboarding B.Management configuration C.Policy configuration D.Network modeling Answer: C Fortinet NSE7_ZTA-7.2 Real Dumps 4. With the increase in loT devices, which two challenges do enterprises face? (Choose two.) A.Bandwidth consumption due to added overhead of loT B.Maintaining a high performance network C.Unpatched vulnerabilities in loT devices D.Achieving full network visibility Answer: C, D Fortinet NSE7_ZTA-7.2 Real Dumps 5. Which statement is true about FortiClient EMS in a ZTNA deployment? A.Uses endpoint information to grant or deny access to the network B.Provides network and user identity authentication services C.Generates and installs client certificates on managed endpoints D.Acts as ZTNA access proxy for managed endpoints Answer: A Fortinet NSE7_ZTA-7.2 Real Dumps 6. Which statement is true regarding a FortiClient quarantine using FortiAnalyzer playbooks? A.FortiGate sends a notification to FortiClient EMS to quarantine the endpoint B.FortiAnalyzer discovers malicious activity in the logs and notifies FortiGate C.FortiAnalyzer sends an API to FortiClient EMS to quarantine the endpoint D.FortiClient sends logs to FortiAnalyzer Answer: C Fortinet NSE7_ZTA-7.2 Real Dumps 7. Which method is used to install passive agent on an endpoint? A.Deployed by using a login/logout script B.Agent is downloaded from Playstore C.Agent is downloaded and run from captive portal D.Installed by user or deployment tools Answer: D Fortinet NSE7_ZTA-7.2 Real Dumps 8. With the increase in loT devices, which two challenges do enterprises face? (Choose two.) A.Bandwidth consumption due to added overhead of loT B.Maintaining a high performance network C.Unpatched vulnerabilities in loT devices D.Achieving full network visibility Answer: C, D Fortinet NSE7_ZTA-7.2 Real Dumps 9. An administrator is trying to create a separate web tittering profile for off-fabric and on-fabric clients and push it to managed FortiClient devices. Where can you enable this feature on FortiClient EMS? A.Endpoint policy B.ZTNA connection rules C.System settings D.On-fabric rule sets Answer: A Fortinet NSE7_ZTA-7.2 Real Dumps 10. What are the three core principles of ZTA? (Choose three.) A.Verity B.Be compliant C.Certify D.Minimal access E.Assume breach Answer: A, D, E