A,C - "A ZTNA rule is a proxy policy used to enforce access control. ZTNA tags or tag groups can be defined to enforce zero trust role based access. Security profiles can be configured to protect this traffic."
A and C are right --> the ztna rule is aproxy policy used to enforce access control and security profiles can be configured to protect this traffic ( study guide 7.0 pag 236 )
A and C are right --> A ZTNA rule is a proxy policy used to enforce access control. You can define ZTNA tags or tag groups to enforce zero-trust role-based access. You can configure security profiles to protect this traffic. ( study guide 7.2 pag 176)
"ZTNA rules help control access by defining users and ZTNA tags to perform user authentication and security posture checks. And just like firewall policies, you can control the source and destination addresses, and apply appropriate security profiles to scan the traffic."
https://docs.fortinet.com/document/fortigate/7.0.0/ztna-deployment/899992/configuring-ztna-rules-to-control-access
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
zequel
Highly Voted 1 year, 4 months agotachy_22
Highly Voted 1 year, 1 month agomyrmidon3
Most Recent 7 months, 3 weeks agoTomer676
1 year, 2 months ago[Removed]
1 year, 4 months ago