What are two advantages of using zero-trust tags? (Choose two.)
What are two advantages of using zero-trust tags? (Choose two.)
A . Zero-trust tags can be used to allow or deny access to network resources
B . Zero-trust tags can determine the security posture of an endpoint.
C . Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints
D . Zero-trust tags can be used to allow secure web gateway (SWG) access
Answer: AB
Explanation:
Zero-trust tags are critical in implementing zero-trust network access (ZTNA) policies.
Here are the two key advantages of using zero-trust tags:
Access Control (Allow or Deny):
Zero-trust tags can be used to define policies that either allow or deny access to specific network resources based on the tag associated with the user or device.
This granular control ensures that only authorized users or devices with the appropriate tags can access sensitive resources, thereby enhancing security. Determining Security Posture:
Zero-trust tags can be utilized to assess and determine the security posture of an endpoint. Based on the assigned tags, FortiSASE can evaluate the device’s compliance with security policies, such as antivirus status, patch levels, and configuration settings.
Devices that do not meet the required security posture can be restricted from accessing the network or given limited access.
Reference: FortiOS 7.2 Administration Guide: Provides detailed information on configuring and using zero-trust tags for access control and security posture assessment.
FortiSASE 23.2 Documentation: Explains how zero-trust tags are implemented and used within the FortiSASE environment for enhancing security and compliance.
Latest FCSS_SASE_AD-23 Dumps Valid Version with 30 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund