exam questions

Exam NSE7_ZTA-7.2 All Questions

View all questions & answers for the NSE7_ZTA-7.2 exam

Exam NSE7_ZTA-7.2 topic 1 question 15 discussion

Actual exam question from Fortinet's NSE7_ZTA-7.2
Question #: 15
Topic #: 1
[All NSE7_ZTA-7.2 Questions]

An administrator has to configure LDAP authentication for ZTNA HTTPS access proxy.
Which authentication scheme can the administrator apply?

  • A. Basic
  • B. Form-based
  • C. Digest
  • D. NTLM
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Selected Answer: A
Zero Trust Access 7.2 Study Guide Page 117. "You can also configure authentication to the access proxy. ZTNA supports basic HTTP and SAML methods." Zero Trust Access 7.2 Study Guide Page 120. "The authentication scheme defines the method of authentication that is applied. ZTNA supports basic HTTP and SAML methods. Each method has additional settings to define the data source. For example, with basic HTTP authentication, a user database can reference an LDAP server, RADIUS server, local database, or other supported authentication servers that the user is authenticated against."
upvoted 2 times
...
amarsulistio
1 month ago
Selected Answer: B
LDAP (Lightweight Directory Access Protocol) authentication for ZTNA (Zero Trust Network Access) HTTPS access proxy is effectively implemented using a Form-based authentication scheme. This approach allows for a secure, interactive, and user-friendly means of capturing credentials. Form-based authentication presents a web form to the user, enabling them to enter their credentials (username and password), which are then processed for authentication against the LDAP directory. This method is widely used for web-based applications, making it a suitable choice for HTTPS access proxy setups in a ZTNA framework. Reference: FortiGate Security 7.2 Study Guide, LDAP Authentication configuration sections.
upvoted 3 times
...
lil_pc1972
3 months, 2 weeks ago
You can add authentication to the access proxy, which requires you to configure an authentication scheme and authentication rule on the FortiGate. You use authentication schemes and authentication rules to authenticate proxy-based policies, similar to configuring authentication for explicit and transparent proxy. The authentication scheme defines the method of authentication that is applied. ZTNA supports basic HTTP and SAML methods. Each method has additional settings to define the data source. For example, with basic HTTP authentication, a user database can reference an LDAP server, RADIUS server, local database, or other supported authentication servers that the user is authenticated against.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago