Which FortiSASE feature ensures least-privileged user access to corporate applications that are protected by an on-premises FortiGate device?
An organization must block user attempts to log in to non-company resources while using Microsoft Office 365 to prevent users from accessing unapproved cloud resources.
Which FortiSASE feature can you implement to meet this requirement?
What are two benefits of deploying secure private access with SD-WAN? (Choose two.)
Which two components are part of onboarding a secure web gateway (SWG) endpoint for secure internet access (SIA)? (Choose two.)
What are two benefits of deploying FortiSASE with FortiGate ZTNA access proxy? (Choose two.)
In a FortiSASE SD-WAN deployment with dual hubs, what are two benefits of assigning hubs with different priorities? (Choose two.)
How do security profile group objects behave when central management is enabled on FortiSASE?
Which FortiSASE component protects users from online threats by hosting their browsing sessions on a remote container within a secure environment?
Refer to the exhibit.
The daily report for application usage for internet traffic shows an unusually high number of unknown applications by category.
What are two possible explanations for this? (Choose two.)