Module 2 Flashcards

(19 cards)

1
Q

How do you use fortiguard forensics analysis

A

You submit in the portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can DEM help with?

A

Connectivity
Bandwidth
CPU
MEMORY
Hard disk
SaaS monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three common use cases for dedicated public IP address deployments are:

A

Traffic identification and isolation
* Geolocation rules (TAC Ticket)
* Source IP anchoring (TAC Ticket)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can you get Add on IP licenses for Standard licensing?

A

Yes, costs extra.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In version 24, how many IP addresses can you add per POP?

A

One, per POP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Geolocation IP add

A

In the geolocation rules use case, the customer can request the dedicated public IP address of a POP to be
mapped to a different geolocation, while traffic still transits through its actual geolocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe Source IP anchoring

A

Additional dedicated public IP add-on
license is required with four additional
dedicated IP addresses

Source IP anchoring policy can be used
to SNAT a specific user, group, or country
of incoming remote users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe Endpoint mode

A

Uses SSL VPN
The VPN policy
on FortiSASE is configured with the required security components, such as web filter, application control, and
so on, to secure the internet traffic. Endpoint mode also supports configuring zero trust network access
(ZTNA) for compliance checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe SWG mode

A

Explicit Proxy for HTTP/HTTPS
Uses PAC file or configures web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Does SWG Require you to download a CA certificate?

A

Yes, it is required as SWG mode intercepts SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What options do you have for Remote Auth of users for FortISASE?

A

LDAP
RADIUS
SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Common Name Identifier

A

is the attribute name you use to find the username.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Distinguished Name

A

setting identifies the top of the tree where the users are located, which is generally
the domain controller (DC) value; however, it can be a specific container or organizational unit (OU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three roles of SAML?

A

Principal
Identity Provider
Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe SAML Principal

A

An entity that requests access to a service that
requires authentication and authorization
* Can be a user, group, or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a SAML IdP

A

Identity Provider
Creates, maintains, and manages identity information
* Responds to requests for SAML assertions made by a
service provider

17
Q

What is SAML Sp?

A

Requires service to a principal
Relies on an IdP for authentication and authorization
information

18
Q

What happens when you configure SSO

A

It overrides all other authentication method