Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Fortinet FCSS_SASE_AD-25 Dumps

FCSS - FortiSASE 25 Administrator Questions and Answers

Question 1

What can be configured on FortiSASE as an additional layer of security for FortiClient registration?

Options:

A.

security posture tags

B.

application inventory

C.

user verification

D.

device identification

Question 2

Which information does FortiSASE use to bring network lockdown into effect on an endpoint?

Options:

A.

Zero-day malware detection on endpoint

B.

The number of critical vulnerabilities detected on the endpoint

C.

The security posture of the endpoint based on ZTNA tags

D.

The connection status of the tunnel to FortiSASE

Question 3

Refer to the exhibit.

as

The daily report for application usage for internet traffic shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

Options:

A.

Certificate inspection is not being used to scan application traffic.

B.

Deep inspection is not being used to scan traffic.

C.

The private access policy must be to set to log Security Events.

D.

The inline-CASB application control profile does not have application categories set to Monitor.

Question 4

An organization must block user attempts to log in to non-company resources while using Microsoft Office 365 to prevent users from accessing unapproved cloud resources.

Which FortiSASE feature can you implement to meet this requirement?

Options:

A.

application control with inline-CASB

B.

data loss prevention (DLP) with Microsoft Purview Information Protection (MPIP)

C.

web filter with inline-CASB

D.

DNS filter with domain filter

Question 5

Refer to the exhibits.

as

as

How will the application vulnerabilities be patched, based on the exhibits provided?

Options:

A.

The vulnerability will be patched automatically based on the endpoint profile configuration.

B.

The vulnerability will be patched by installing the patch from the vendor’s website.

C.

The end user will patch the vulnerabilities using the FortiClient software.

D.

An administrator will patch the vulnerability remotely using FortiSASE.

Question 6

Your FortiSASE customer has a small branch office in which ten users will be using their personal laptops and mobile devices to access the internet.

Which deployment should they use to secure their internet access with minimal configuration?

Options:

A.

Deploy FortiGate as a LAN extension to secure internet access.

B.

Deploy FortiAP to secure internet access.

C.

Deploy FortiClient endpoint agent to secure internet access.

D.

Deploy SD-WAN on-ramp to secure internet access.

Question 7

What are two benefits of deploying FortiSASE with FortiGate ZTNA access proxy? (Choose two.)

Options:

A.

It offers data center redundancy.

B.

The on-premises FortiGate performs a device posture check.

C.

It is ideal for latency-sensitive applications.

D.

It supports both agentless ZTNA and agent-based ZTNA.

Question 8

What happens to the logs on FortiSASE that are older than the configured log retention period?

Options:

A.

The logs are deleted from FortiSASE.

B.

The logs are indexed and can be stored in a SQL database.

C.

The logs are backed up on FortiCloud.

D.

The logs are compressed and archived.

Question 9

Which FortiSASE component protects users from online threats by hosting their browsing sessions on a remote container within a secure environment?

Options:

A.

secure web gateway (SWG)

B.

remote browser isolation (RBI)

C.

cloud access security broker (CASB)

D.

data loss prevention (DLP)

Question 10

What are two advantages of using zero-trust tags? (Choose two.)

Options:

A.

Zero-trust tags can determine the security posture of an endpoint.

B.

Zero-trust tags can be assigned to endpoint profiles based on user groups.

C.

Zero-trust tags can be used to allow or deny access to network resources.

D.

Zero-trust tags can help monitor endpoint system resource usage.

Question 11

Your organization is currently using FortiSASE for its cybersecurity. They have recently hired a contractor who will work from the HQ office and who needs temporary internet access in order to set up a web-based point of sale (POS) system.

What is the recommended way to provide internet access to the contractor?

Options:

A.

Use zero trust network access (ZTNA) and tag the client as an unmanaged endpoint.

B.

Use the self-registration portal on FortiSASE to grant internet access.

C.

Use a tunnel policy with a contractors user group as the source on FortiSASE to provide internet access.

D.

Use a proxy auto-configuration (PAC) file and provide secure web gateway (SWG) service as an explicit web proxy.

Question 12

Which service is included in a secure access service edge (SASE) solution, but not in a security service edge (SSE) solution?

Options:

A.

ZTNA

B.

SD-WAN

C.

SWG

D.

CASB

Question 13

Which description of the FortiSASE inline-CASB component is true?

Options:

A.

It has limited visibility when data is transmitted.

B.

It detects data in motion.

C.

It is placed outside the traffic path.

D.

It relies on API to integrate with cloud services.

Question 14

When accessing the FortiSASE portal for the first time, an administrator must select data center locations for which three FortiSASE components? (Choose three.)

Options:

A.

Identity & access management (IAM)

B.

Points of presence

C.

Endpoint management

D.

Logging

E.

Sandbox

Question 15

A customer wants to upgrade their legacy on-premises proxy to a cloud-based proxy for a hybrid network.

Which two FortiSASE features would help the customer achieve this outcome? (Choose two.)

Options:

A.

secure web gateway (SWG)

B.

zero trust network access (ZTNA)

C.

sandbox cloud

D.

inline-CASB

Page: 1 / 5
Total 51 questions