Which two deployment methods are used to connect a FortiExtender as a FortiSASE LAN extension? (Choose two.)
Refer to the exhibit.
A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.
Which configuration must you apply to achieve this requirement?
Refer to the exhibits.
When remote users connected to FortiSASE require access to internal resources on Branch-2. how will traffic be routed?
When deploying FortiSASE agent-based clients, which three features are available compared to an agentless solution? (Choose three.)
Which two statements describe a zero trust network access (ZTNA) private access use case? (Choose two.)
Which policy type is used to control traffic between the FortiClient endpoint to FortiSASE for secure internet access?
A customer wants to upgrade their legacy on-premises proxy to a could-based proxy for a hybrid network. Which FortiSASE features would help the customer to achieve this outcome?
Which two additional components does FortiSASE use for application control to act as an inline-CASB? (Choose two.)
To complete their day-to-day operations, remote users require access to a TCP-based application that is hosted on a private web server. Which FortiSASE deployment use case provides the most efficient and secure method for meeting the remote users' requirements?