Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 0d 16h 37m 22s Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam NSE7_ZTA-7.2 Topic 3 Question 4 Discussion

Actual exam question for Fortinet's NSE7_ZTA-7.2 exam
Question #: 4
Topic #: 3
[All NSE7_ZTA-7.2 Questions]

Which three statements are true about zero-trust telemetry compliance1? (Choose three.)

Show Suggested Answer Hide Answer
Suggested Answer: A

Based on the ZTNA logs provided, the true statement is:

A) The Remote_user ZTNA tag has matched the ZTNA rule: The log includes a user tag 'ztna_user' and a policy name 'External_Access_FAZ', which suggests that the ZTNA tag for 'Remote_User' has successfully matched the ZTNA rule defined in the policy to allow access.

The other options are not supported by the information in the log:

B) An authentication scheme is configured: The log does not provide details about an authentication scheme.

C) The external IP for ZTNA server is 10.122.0.139: The log entry indicates 'dstip=10.122.0.139' which suggests that this is the destination IP address for the traffic, not necessarily the external IP of the ZTNA server.

D) Traffic is allowed by firewall policy 1: The log entry 'policyid=1' indicates that the traffic is matched to firewall policy ID 1, but it does not explicitly state that the traffic is allowed; although the term 'action=accept' suggests that the action taken by the policy is to allow the traffic, the answer option D could be considered correct as well.


Interpretation of FortiGate ZTNA Log Files.

Analyzing Traffic Logs for Zero Trust Network Access.

Contribute your Thoughts:

Melissa
1 months ago
Wait, so we have zero-trust telemetry compliance, but what about one-trust telemetry compliance? Asking for a friend who likes to live life on the edge.
upvoted 0 times
Nettie
6 days ago
E) FortiClient EMS sends the endpoint information received through FortiClient Telemetry to FortiOS
upvoted 0 times
...
Mel
13 days ago
C) ZTNA tags are configured in FortiClient, based on criteria such as certificates and the logged in domain
upvoted 0 times
...
Ashton
15 days ago
A) FortiClient EMS creates dynamic policies using ZTNAtags
upvoted 0 times
...
...
Rima
1 months ago
This question is a real head-scratcher. I'm going to go with A, D, and E, but I'm not entirely confident. Guess I need to brush up on my FortiClient and FortiOS knowledge.
upvoted 0 times
Roosevelt
7 days ago
D) FortiOS provides network access to the endpoint based on the zero-trust tagging rules
upvoted 0 times
...
Pamella
8 days ago
A) FortiClient EMS creates dynamic policies using ZTNAtags
upvoted 0 times
...
...
Lonna
1 months ago
Haha, I bet the exam writers were feeling punny when they came up with 'zero-trust telemetry compliance1'. Anyway, I think A, D, and E are the way to go.
upvoted 0 times
...
Judy
2 months ago
I'm not sure about D, but A, C, and E seem correct to me.
upvoted 0 times
...
Joseph
2 months ago
Wait, I'm confused. Doesn't FortiClient check the endpoint using the ZTNA tags, not FortiClient EMS? I'm not sure about C, but the other three seem right.
upvoted 0 times
Donte
7 days ago
D) FortiOS provides network access to the endpoint based on the zero-trust tagging rules
upvoted 0 times
...
Melodie
25 days ago
B) FortiChent checks the endpoint using the ZTNAtags provided by FortiClient EMS
upvoted 0 times
...
Pete
1 months ago
A) FortiClient EMS creates dynamic policies using ZTNAtags
upvoted 0 times
...
...
Sage
2 months ago
I agree with Salina, those statements make sense.
upvoted 0 times
...
Georgeanna
2 months ago
I think A, D, and E are the correct statements. FortiClient EMS creates dynamic policies using ZTNA tags, and FortiOS provides network access based on those zero-trust tagging rules. Also, FortiClient EMS sends the endpoint information to FortiOS.
upvoted 0 times
...
Salina
2 months ago
I think A, C, and E are true.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77
a