Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam NSE7_ZTA-7.2 Topic 1 Question 24 Discussion

Actual exam question for Fortinet's NSE7_ZTA-7.2 exam
Question #: 24
Topic #: 1
[All NSE7_ZTA-7.2 Questions]

Which one of the supported communication methods does FortiNAC use for initial device identification during discovery?

Show Suggested Answer Hide Answer
Suggested Answer: A

Based on the ZTNA logs provided, the true statement is:

A) The Remote_user ZTNA tag has matched the ZTNA rule: The log includes a user tag 'ztna_user' and a policy name 'External_Access_FAZ', which suggests that the ZTNA tag for 'Remote_User' has successfully matched the ZTNA rule defined in the policy to allow access.

The other options are not supported by the information in the log:

B) An authentication scheme is configured: The log does not provide details about an authentication scheme.

C) The external IP for ZTNA server is 10.122.0.139: The log entry indicates 'dstip=10.122.0.139' which suggests that this is the destination IP address for the traffic, not necessarily the external IP of the ZTNA server.

D) Traffic is allowed by firewall policy 1: The log entry 'policyid=1' indicates that the traffic is matched to firewall policy ID 1, but it does not explicitly state that the traffic is allowed; although the term 'action=accept' suggests that the action taken by the policy is to allow the traffic, the answer option D could be considered correct as well.


Interpretation of FortiGate ZTNA Log Files.

Analyzing Traffic Logs for Zero Trust Network Access.

Contribute your Thoughts:

Annelle
1 months ago
Wait, so FortiNAC can't use smoke signals for device discovery? I'm disappointed. That would have been my first choice.
upvoted 0 times
...
Laticia
1 months ago
LLDP, eh? I wonder if it stands for 'Let's Locate Devices Peculiarly.' Gotta love these networking acronyms!
upvoted 0 times
In
3 days ago
A) LLDP
upvoted 0 times
...
...
Dong
2 months ago
LLDP? Really? I was certain it would be something more secure like SSH. Guess I'll have to start using LLDP to discover all my devices from now on.
upvoted 0 times
Filiberto
12 days ago
I thought it would be SSH too, but LLDP is the way to go.
upvoted 0 times
...
Tasia
14 days ago
Yes, FortiNAC uses LLDP for that purpose.
upvoted 0 times
...
Tamar
16 days ago
LLDP is actually used for initial device identification during discovery.
upvoted 0 times
...
...
Antione
2 months ago
LLDP, huh? I was sure it was something more exotic like API or SSH. Looks like I need to re-read the FortiNAC documentation.
upvoted 0 times
Willard
19 days ago
It's always good to review the documentation to stay up to date with the supported communication methods.
upvoted 0 times
...
Toi
1 months ago
API and SSH are used for different purposes in FortiNAC, not for initial device identification.
upvoted 0 times
...
Lenny
1 months ago
Yes, LLDP is used by FortiNAC during discovery to gather information about connected devices.
upvoted 0 times
...
Salley
1 months ago
LLDP is actually a common method used for initial device identification.
upvoted 0 times
...
...
Farrah
2 months ago
I thought FortiNAC uses SNMP for device discovery, but I guess LLDP is the correct answer. I need to brush up on my FortiNAC knowledge.
upvoted 0 times
...
Kris
2 months ago
Yes, that's true. Both LLDP and SNMP are supported communication methods for initial device identification in FortiNAC.
upvoted 0 times
...
Cyndy
2 months ago
I believe SNMP is also used for initial device identification by FortiNAC.
upvoted 0 times
...
Kris
3 months ago
I think FortiNAC uses LLDP for initial device identification.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77