What are two advantages of using zero-trust tags? (Choose two.)
Refer to the exhibits.A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The VPN tunnel does not establish.Based on the provided configuration, what configuration needs to be modified to bring the tunnel up?
Refer to the exhibits.When remote users connected to FortiSASE require access to internal resources on Branch-2, how will traffic be routed?
Refer to the exhibits.A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org. Traffic logs show traffic is allowed by the policy.Which configuration on FortiSASE is allowing users to perform the download?
Refer to the exhibit.A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical interface.Which configuration must you apply to achieve this requirement?
Refer to the exhibit.The daily report for application usage shows an unusually high number of unknown applications by category.What are two possible explanations for this? (Choose two.)