[Q15-Q35] 認証トレーニングNSE7_ZTA-7.2試験問題集テストエンジン [2024]

Share

認証トレーニングNSE7_ZTA-7.2試験問題集テストエンジン [2024]

2024年04月22日ガイド準備でNSE7_ZTA-7.2試験合格


Fortinet NSE7_ZTA-7.2 認定試験の出題範囲:

トピック出題範囲
トピック 1
  • Use FortiClient EMS quarantine management
  • Identify the ZTA components
トピック 2
  • Configure FortiAnalyzer playbooks
  • Integrate FortiClient EMS with FortiNAC
トピック 3
  • Zero trust network access (ZTNA) deployment
  • Zero trust access (ZTA) methodology and components
トピック 4
  • Configure and manage FortiNAC
  • Explain endpoint compliance and workflow

 

質問 # 15
Which three core products are mandatory in the Fortinet ZTNA solution'' {Choose three.)

  • A. FortiClient EMS
  • B. FortiToken
  • C. FortiClient
  • D. FortiAuthenticator
  • E. FortiGate

正解:A、C、E

解説:
Fortinet ZTNA solution is a zero-trust network access approach that provides secure and granular access to applications hosted anywhere, for users working from anywhere. The three core products that are mandatory in the Fortinet ZTNA solution are:
FortiClient EMS: This is the central management console that orchestrates the ZTNA policies and provides visibility and control over the endpoints and devices. It also integrates with FortiAuthenticator for identity verification and FortiAnalyzer for reporting and analytics.
FortiClient: This is the endpoint agent that supports ZTNA, VPN, endpoint protection, and vulnerability scanning. It establishes encrypted tunnels with the ZTNA proxy on the FortiGate and provides device posture and single sign-on (SSO) capabilities.
FortiGate: This is the next-generation firewall that acts as the ZTNA proxy and enforces the ZTNA policies based on user identity, device posture, and application context. It also provides security inspection and threat prevention for the ZTNA traffic.
References := Zero Trust Network Access (ZTNA) - Fortinet, Zero-Trust Network Access Solution | Fortinet, and Fortinet ZTNA | Fortinet Case Study.


質問 # 16
What are the three core principles of ZTA? (Choose three.)

  • A. Verity
  • B. Minimal access
  • C. Certify
  • D. Assume breach
  • E. Be compliant

正解:A、B、D

解説:
Zero Trust Architecture (ZTA) is a security model that follows the philosophy of "never trust, always verify" and does not assume any implicit trust for any entity within or outside the network perimeter. ZTA is based on a set of core principles that guide its implementation and operation. According to the NIST SP 800-207, the three core principles of ZTA are:
A: Verify and authenticate. This principle emphasizes the importance of strong identification and authentication for all types of principals, including users, devices, and machines. ZTA requires continuous verification of identities and authentication status throughout a session, ideally on each request. It does not rely solely on traditional network location or controls. This includes implementing modern strong multi-factor authentication (MFA) and evaluating additional environmental and contextual signals during authentication processes.
D: Least privilege access. This principle involves granting principals the minimum level of access required to perform their tasks. By adopting the principle of least privilege access, organizations can enforce granular access controls, so that principals have access only to the resources necessary to fulfill their roles and responsibilities. This includes implementing just-in-time access provisioning, role-based access controls (RBAC), and regular access reviews to minimize the surface area and the risk of unauthorized access.
E: Assume breach. This principle assumes that the network is always compromised and that attackers can exploit any vulnerability or weakness. Therefore, ZTA adopts a proactive and defensive posture that aims to prevent, detect, and respond to threats in real-time. This includes implementing micro-segmentation, end-to-end encryption, and continuous monitoring and analytics to restrict unnecessary pathways, protect sensitive data, and identify anomalies and potential security events.
References :=
1: Understanding Zero Trust principles - AWS Prescriptive Guidance
2: Zero Trust Architecture - NIST


質問 # 17
Exhibit.

An administrator has to provide on-fabric clients with access to FortiAnalyzer using ZTNA tags Which two conditions must be met to achieve this task? (Choose two.)

  • A. The ZTNArule must be configured on FortiClient
  • B. The ZTNA server must be configured on FortiGate
  • C. The IP/MAC based firewall policy must be configured on FortiGate
  • D. The on-fabric client should have FortiGate as its default gateway

正解:B、D

解説:
For on-fabric clients to access FortiAnalyzer using ZTNA tags, the following conditions must be met:
A: The on-fabric client should have FortiGate as its default gateway: This is essential to ensure that all client traffic is routed through FortiGate, where ZTNA policies can be enforced.
B: The ZTNA server must be configured on FortiGate: For ZTNA tags to be effectively used, the ZTNA server, which processes and enforces these tags, must be configured on the FortiGate appliance.
References :=
Configuring ZTNA tags and tagging rules
Synchronizing FortiClient ZTNA tags
FortiAnalyzer
Technical Tip: ZTNA Tags fail to synchronize between FortiClient and FortiGate


質問 # 18
Which two types of configuration can you associate with a user/host profile on FortiNAC? (Choose two.)

  • A. Endpoint compliance
  • B. Network Access
  • C. Service Connectors
  • D. Inventory

正解:A、B

解説:
User/host profiles are used to map sets of hosts and users to different types of policies or rules on FortiNAC.
Among the options given, network access and endpoint compliance are the two types of configuration that can be associated with a user/host profile. Network access configuration determines the VLAN, CLI configuration or VPN group that is assigned to a host or user based on their profile. Endpoint compliance configuration defines the policies that checkthe host or user for compliance status, such as antivirus, firewall, patch level, etc. Service connectors and inventory are not types of configuration, but features of FortiNAC that allow integration with other services and devices, and collection of host and user data, respectively. References := User/host profiles | FortiNAC 9.4.0 - Fortinet Documentation and User/host profiles | FortiNAC 9.4.0 - Fortinet Documentation


質問 # 19
What are two functions of NGFW in a ZTA deployment? (Choose two.)

  • A. Device discovery and profiling
  • B. Packet Inspection
  • C. Acts as segmentation gateway
  • D. Endpoint vulnerability management

正解:A、C

解説:
NGFW stands for Next-Generation Firewall, which is a network security device that provides advanced features beyond the traditional firewall, such as application awareness, identity awareness, threat prevention, and integration with other security tools. ZTA stands for Zero Trust Architecture, which is a security model that requires strict verification of the identity and context of every request before granting access to network resources. ZTA assumes that no device or user can be trusted by default, even if they are connected to a corporate network or have been previously verified.
In a ZTA deployment, NGFW can perform two functions:
Acts as segmentation gateway: NGFW can act as a segmentation gateway, which is a device that separates different segments of the network based on security policies and rules. Segmentation can help isolate and protect sensitive data and applications from unauthorized or malicious access, as well as reduce the attack surface and contain the impact of a breach. NGFW can enforce granular segmentation policies based on the identity and context of the devices and users, as well as the applications and services they are accessing. NGFW can also integrate with other segmentation tools, such as software-defined networking (SDN) and microsegmentation, to provide a consistent and dynamic segmentation across the network.
Device discovery and profiling: NGFW can also perform device discovery and profiling, which are processes that identify and classify the devices that are connected to the network, as well as their attributes and behaviors. Device discovery and profiling can help NGFW to apply the appropriate security policies and rules based on the device type, role, location, health, and activity. Device discovery and profiling can also help NGFW to detect and respond to anomalous or malicious devices that may pose a threat to the network.
References: =
Some possible references for the answer and explanation are:
What is a Next-Generation Firewall (NGFW)? | Fortinet : What is Zero Trust Network Access (ZTNA)? | Fortinet : Zero Trust Architecture Explained: A Step-by-Step Approach : The Most Common NGFW Deployment Scenarios : Sample Configuration for Post vWAN Deployment


質問 # 20
Exhibit.

Which two statements are true about the hr endpoint? (Choose two.)

  • A. The endpoint application inventory could not be retrieved
  • B. The endpoint is marked as a rogue device
  • C. The endpoint will be moved to the remediation VLAN
  • D. The endpoint has failed the compliance scan

正解:B、D

解説:
Based on the exhibit, the true statements about the hr endpoint are:
B: The endpoint is marked as a rogue device: The "w" symbol typically indicates a warning or an at-risk status, which can be associated with an endpoint being marked as rogue due to failing to meet the security compliance requirements or other reasons.
C: The endpoint has failed the compliance scan: The "w" symbol can also signify that the endpoint has failed a compliance scan, which is a common reason for an endpoint to be marked as at risk.


質問 # 21
Which two statements are true regarding certificate-based authentication for ZTNA deployment? (Choose two.)

  • A. FortiGate signs the client certificate submitted by FortiClient.
  • B. Certificate actions can be configured only on the FortiGate CLI
  • C. Client certificate configuration is a mandatory component for ZTNA
  • D. The default action for empty certificates is block

正解:C、D

解説:
Certificate-based authentication is a method of verifying the identity of a device or user by using a digital certificate issued by a trusted authority. For ZTNA deployment, certificate-based authentication is used to ensure that only authorized devices and users can access the protected applications or resources.
B: The default action for empty certificates is block. This is true because ZTNA requires both device and user verification before granting access. If a device does not have a valid certificate issued by the ZTNA CA, it will be blocked by the ZTNA gateway. This prevents unauthorized or compromised devices from accessing the network.
D: Client certificate configuration is a mandatory component for ZTNA. This is true because ZTNA relies on client certificates to identify and authenticate devices. Client certificates are generated by the ZTNA CA and contain the device ID, ZTNA tags, and other information. Client certificates are distributed to devices by the ZTNA management server (such as EMS) and are used to establish a secure connection with the ZTNA gateway.
A: FortiGate signs the client certificate submitted by FortiClient. This is false because FortiGate does not sign the client certificates. The client certificates are signed by the ZTNA CA, which is a separate entity from FortiGate. FortiGate only verifies the client certificates and performs certificate actions based on the ZTNA tags.
C: Certificate actions can be configured only on the FortiGate CLI. This is false because certificate actions can be configured on both the FortiGate GUI and CLI. Certificate actions are the actions that FortiGate takes based on the ZTNA tags in the client certificates. For example, FortiGate can allow, block, or redirect traffic based on the ZTNA tags.
References :=
1: Technical Tip: ZTNA for Corporate hosts with SAML authentication and FortiAuthenticator as IDP
2: Zero Trust Network Access - Fortinet


質問 # 22
FortiNAC has alarm mappings configured for MDM compliance failure, and FortiClient EMS is added as a MDM connector When an endpoint is quarantined by FortiClient EMS, what action does FortiNAC perform?

  • A. The host is disabled
  • B. The host is forced to authenticate again
  • C. The host is marked at risk
  • D. The host is isolated in the registration VLAN

正解:D

解説:
In the scenario where FortiNAC has alarm mappings configured for MDM (Mobile Device Management) compliance failure and FortiClient EMS (Endpoint Management System) is integrated as an MDM connector, the typical response when an endpoint is quarantined by FortiClient EMS is to isolate the host in the registration VLAN. This action is consistent with FortiNAC's approach to network access control, focusing on ensuring network security and compliance. By moving the non-compliant or quarantined host to a registration VLAN, FortiNAC effectively segregates it from the rest of the network, mitigating potential risks while allowing for further investigation or remediation steps.References:FortiNAC documentation, MDM Compliance and Response Actions.


質問 # 23
Which factor is a prerequisite on FortiNAC to add a Layer 3 router to its inventory?

  • A. The router responding to ping requests from the FortiNAC eth1 IP address
  • B. Allow HTTPS access from the router to the FortiNAC ethO IP address
  • C. Allow FTP access to the FortiNAC database from the router
  • D. SNMP or CLI access to the router to carry out remote tasks

正解:D

解説:
FortiNAC uses SNMP or CLI to communicate with network devices such as routers and switches. To add a Layer 3 router to its inventory, FortiNAC needs to have SNMP or CLI access to the router to perform remote tasks such as polling, VLAN assignment, and port shutdown. Without SNMP or CLI access, FortiNAC cannot manage the router or its ports. Therefore, SNMP or CLI access is a prerequisite for adding a Layer 3 router to FortiNAC's inventory. References := https://docs.fortinet.com/document/fortinac/9.4.0/administration-guide/105927/inventor
https://docs.fortinet.com/document/fortinac/9.4.0/administration-guide/344098/l3-polling


質問 # 24
Which three statements are true about a persistent agent? (Choose three.)

  • A. Deployed by a login/logout script and is not installed on the endpoint
  • B. Can be used for automatic registration and authentication
  • C. Supports advanced custom scans and software inventory.
  • D. Can apply supplicant configuration to a host
  • E. Agent is downloaded and run from captive portal

正解:B、C、D

解説:
A persistent agent is an application that works on Windows, macOS, or Linux hosts to identify them to FortiNAC Manager and scan them for compliance with an endpoint compliance policy. A persistent agent can support advanced custom scans and software inventory, apply supplicant configuration to a host, and be used for automatic registration and authentication. References := Persistent Agent Persistent Agent on Windows Using the Persistent Agent


質問 # 25
Which three statements are true about zero-trust telemetry compliance1? (Choose three.)

  • A. FortiClient EMS creates dynamic policies using ZTNAtags
  • B. ZTNA tags are configured in FortiClient,based on criteria such as certificates and the logged in domain
  • C. FortiChent checks the endpoint using the ZTNAtags provided by FortiClient EMS
  • D. FortiClient EMS sends the endpoint information received through FortiClient Telemetry to FortiOS
  • E. FortiOS provides network access to the endpoint based on the zero-trust tagging rules

正解:A、C、E

解説:
In the context of zero-trust telemetry compliance, the three true statements are:
A: FortiClient EMS creates dynamic policies using ZTNA tags: FortiClient EMS utilizes ZTNA (Zero Trust Network Access) tags to create dynamic policies based on the telemetry it receives from endpoints.
B: FortiClient checks the endpoint using the ZTNA tags provided by FortiClient EMS: FortiClient on the endpoint uses the ZTNA tags from FortiClient EMS to determine compliance with the specified security policies.
D: FortiOS provides network access to the endpoint based on the zero-trust tagging rules: FortiOS, the operating system running on FortiGate devices, uses the zero-trust tagging rules to make decisions on network access for endpoints.
The other options are not accurate in this context:
C: ZTNA tags are configured in FortiClient, based on criteria such as certificates and the logged-in domain: ZTNA tags are typically configured and managed in FortiClient EMS, not directly in FortiClient.
E: FortiClient EMS sends the endpoint information received through FortiClient Telemetry to FortiOS: While FortiClient EMS does process telemetry data, the direct sending of endpoint information to FortiOS is not typically described in this manner.
References:
Zero Trust Telemetry in Fortinet Solutions.
FortiClient EMS and FortiOS Integration for ZTNA.


質問 # 26
Exhibit.

Which statement is true about the FortiAnalyzer playbook configuration shown in the exhibit?

  • A. The playbook is run when an incident is created that matches the filters.
  • B. The playbook is manually started by an administrator
  • C. The playbook is run when an event is created that matches the filters
  • D. The playbook is run on a configured schedule

正解:B

解説:
The FortiAnalyzer playbook configuration shown in the exhibit indicates that:
D: The playbook is manually started by an administrator: The "ON DEMAND" trigger in the playbook suggests that it is initiated manually, as opposed to being automated or scheduled. This typically means that an administrator decides when to run the playbook based on specific needs or incidents.


質問 # 27
With the increase in loT devices, which two challenges do enterprises face? (Choose two.)

  • A. Maintaining a high performance network
  • B. Bandwidth consumption due to added overhead of loT
  • C. Achieving full network visibility
  • D. Unpatched vulnerabilities in loT devices

正解:C、D

解説:
With the increase in IoT devices, enterprises face many challenges in securing and managing their network and data. Two of the most significant challenges are:
Unpatched vulnerabilities in IoT devices (Option C): IoT devices are often vulnerable to cyber attacks due to their increased exposure to the internet and their limited computing resources. Some of the security challenges in IoT include weak password protection, lack of regular patches and updates, insecure interfaces, insufficient data protection, and poor IoT device management12. Unpatched vulnerabilities in IoT devices can allow hackers to exploit them and compromise the network or data. For example, the Mirai malware infected IoT devices by using default credentials and created a massive botnet that launched DDoS attacks on internet services2.
Achieving full network visibility (Option D): IoT devices can generate a large amount of data that needs to be collected, processed, and analyzed. However, many enterprises lack the tools and capabilities to monitor and manage the IoT devices and data effectively. This can result in poor performance, inefficiency, and security risks. Achieving full network visibility means having a clear and comprehensive view of all the IoT devices, their status, their connectivity, their data flow, and their potential threats. This can help enterprises optimize their network performance, ensure data quality and integrity, and detect and prevent any anomalies or attacks3.
References := 1: Challenges in Internet of things (IoT) - GeeksforGeeks 2: Top IoT security issues and challenges (2022) - Thales 3: 7 challenges in IoT and how to overcome them - Hologram


質問 # 28
......

究極のガイドNSE7_ZTA-7.2認証試験準備NSE 7 Network Security Architect:https://www.jpntest.com/shiken/NSE7_ZTA-7.2-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡