Big Halloween Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Fortinet FCSS_SASE_AD-25 Dumps

FCSS - FortiSASE 25 Administrator Questions and Answers

Question 1

Which two of the following can release the network lockdown on the endpoint applied by FortiSASE? (Choose two.)\

Options:

A.

When the endpoint connects to the FortiSASE tunnel

B.

When the endpoint is determined as on-net

C.

When the endpoint is rebooted

D.

When the endpoint is determined as compliant using ZTNA tags

Question 2

Refer to the exhibit.

as

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.

In this scenario, which two setups will achieve these requirements? (Choose two.)

Options:

A.

Configure ZTNA servers and ZTNA policies on FortiGate.

B.

Configure FortiGate as a zero trust network access (ZTNA) access proxy.

C.

Configure ZTNA tags on FortiGate.

D.

Configure private access policies on FortiSASE with ZTNA.

Question 3

What is required to enable the MSSP feature on FortiSASE?

Options:

A.

Role-based access control (RBAC) must be assigned to identity and access management (IAM) users using the FortiCloud IAM portal.

B.

The MSSP add-on license must be applied to FortiSASE.

C.

MSSP user accounts and permissions must be configured on the FortiSASE portal.

D.

Multi-tenancy must be enabled on the FortiSASE portal.

Question 4

In the Secure Private Access (SPA) use case, which two FortiSASE features facilitate access to corporate applications? (Choose two.)

Options:

A.

cloud access security broker (CASB)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin edge

Question 5

Refer to the exhibits.

as

as

as

as

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub.

The VPN tunnel does not establish.

Which configuration needs to be modified to bring the tunnel up?

Options:

A.

FortiSASE spoke devices do not support mode config.

B.

The network overlay ID must match on FortiSASE and the hub.

C.

The BGP router ID must match on the hub and FortiSASE.

D.

Auto-discovery-sender must be disabled on IPsec phase1 settings.

Question 6

Refer to the exhibit.

as

While reviewing the traffic logs, the FortiSASE administrator notices that the usernames are showing random characters.

Why are the usernames showing random characters?

Options:

A.

Log anonymization is turned on to hash usernames.

B.

Special characters are used in usernames.

C.

Users are using a shared single sign-on SSO username.

D.

FortiSASE uses FortiClient unique identifiers for usernames.

Question 7

For monitoring potentially unwanted applications on endpoints, which information is available on the FortiSASE software installations page?

Options:

A.

the vendor of the software

B.

the endpoint the software is installed on

C.

the license status of the software

D.

the usage frequency of the software

Question 8

Refer to the exhibits.

as

as

as

as

A FortiSASE administrator has configured FortiSASE as a spoke to a FortiGate hub. The tunnel is up to the FortiGate hub. However, the remote FortiClient is not able to access the web server hosted behind the FortiGate hub.

Based on the exhibits, what is the reason for the access failure?

Options:

A.

A private access policy has denied the traffic because of failed compliance

B.

The hub is not advertising the required routes.

C.

The hub firewall policy does not include the FortiClient address range.

D.

The server subnet BGP route was not received on FortiSASE.

Question 9

What is the recommended method to upgrade FortiClient in a FortiSASE deployment?

Options:

A.

Remote users must upgrade the FortiClient manually.

B.

FortiSASE automatically upgrades FortiClient when a new version is released.

C.

The FortiSASE administrator must assign endpoint groups to an endpoint upgrade rule.

D.

The FortiSASE administrator will upload the desired FortiClient version to the FortiSASE portal and push it to endpoints.

Question 10

Which statement best describes the Digital Experience Monitor (DEM) feature on FortiSASE?

Options:

A.

It provides end-to-end network visibility from all the FortiSASE security PoPs to a specific SaaS application.

B.

It gathers all the vulnerability information from all the FortiClient endpoints.

C.

It is used for performing device compliance checks on endpoints.

D.

It monitors the FortiSASE POP health based on ping probes.

Question 11

What are two advantages of using zero-trust tags? (Choose two.)

Options:

A.

Zero-trust tags can determine the security posture of an endpoint.

B.

Zero-trust tags can be assigned to endpoint profiles based on user groups.

C.

Zero-trust tags can be used to allow or deny access to network resources.

D.

Zero-trust tags can help monitor endpoint system resource usage.

Question 12

Which two are required to enable central management on FortiSASE? (Choose two.)

Options:

A.

FortiSASE connector configured on FortiManager.

B.

FortiSASE central management entitlement applied to FortiManager.

C.

The FortiManager IP address in the FortiSASE central management configuration.

D.

FortiManager and FortiSASE registered under the same FortiCloud account.

Question 13

What are two benefits of deploying FortiSASE with FortiGate ZTNA access proxy? (Choose two.)

Options:

A.

It offers data center redundancy.

B.

The on-premises FortiGate performs a device posture check.

C.

It is ideal for latency-sensitive applications.

D.

It supports both agentless ZTNA and agent-based ZTNA.

Question 14

A customer wants to upgrade their legacy on-premises proxy to a cloud-based proxy for a hybrid network.

Which two FortiSASE features would help the customer achieve this outcome? (Choose two.)

Options:

A.

secure web gateway (SWG)

B.

zero trust network access (ZTNA)

C.

sandbox cloud

D.

inline-CASB

Question 15

Which two components are part of onboarding a secure web gateway (SWG) endpoint for secure internet access (SIA)? (Choose two.)

Options:

A.

proxy auto-configuration (PAC) file

B.

FortiSASE certificate authority (CA) certificate

C.

FortiClient software

D.

tunnel policy

Page: 1 / 5
Total 53 questions