New Year Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Fortinet NSE7_SSE_AD-25 Dumps

Fortinet NSE 7 - FortiSASE 25 Enterprise Administrator Questions and Answers

Question 1

What is required to enable the MSSP feature on FortiSASE? (Choose one answer)

Options:

A.

Multi-tenancy must be enabled on the FortiSASE portal.

B.

MSSP user accounts and permissions must be configured on the FortiSASE portal.

C.

The MSSP add-on license must be applied to FortiSASE.

D.

Role-based access control (RBAC) must be assigned to identity and access management (IAM) users using the FortiCloud IAM portal.

Question 2

What are two benefits of deploying secure private access (SPA) with SD-WAN? (Choose two answers)

Options:

A.

ZTNA posture check performed by the hub FortiGate

B.

Support of both TCP and UDP applications

C.

A direct access proxy tunnel from FortiClient to the on-premises FortiGate

D.

Inline security inspection by FortiSASE

Question 3

What is the purpose of security posture tagging in ZTNA? (Choose one answer)

Options:

A.

To assign usernames to different devices for security logs

B.

To ensure that all devices and users are monitored continuously

C.

To provide granular access control based on the compliance status of devices and users1

D.

To categorize devices and users based on their role in the organization

Question 4

When accessing the FortiSASE portal for the first time, an administrator must select data center locations for which three FortiSASE components? (Choose three.)

Options:

A.

Endpoint management

B.

Points of presence

C.

SD-WAN hub

D.

Logging

E.

Authentication

Question 5

Refer to the exhibit.

In the user connection monitor, the FortiSASE administrator notices the user name is showing random characters. Which configuration change must the administrator make to get proper user information?

Options:

A.

Turn off log anonymization on FortiSASE.

B.

Add more endpoint licenses on FortiSASE.

C.

Configure the username using FortiSASE naming convention.

D.

Change the deployment type from SWG to VPN.

Question 6

Your organization is currently using FortiSASE for its cybersecurity. They have recently hired a contractor who will work from the HQ office and who needs temporary internet access in order to set up a web-based point of sale (POS) system. How can you provide secure internet access to the contractor using FortiSASE? (Choose one answer)

Options:

A.

Use a proxy auto-configuration (PAC) file and provide secure web gateway (SWG) service as an explicit web proxy.

B.

Use a tunnel policy with a contractors user group as the source on FortiSASE to provide internet access.

C.

Use zero trust network access (ZTNA) and tag the client as an unmanaged endpoint.

D.

Use the self-registration portal on FortiSASE to grant internet access.

Question 7

When you configure FortiSASE Secure Private Access (SPA) with SD-WAN integration, you must establish a routing adjacency between FortiSASE and the FortiGate SD-WAN hub. Which routing protocol must you use?

Options:

A.

BGP

B.

IS-IS

C.

OSPF

D.

EIGRP

Question 8

How does FortiSASE hide user information when viewing and analyzing logs?

Options:

A.

By hashing data using Blowfish

B.

By hashing data using salt

C.

By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)

D.

By encrypting data using advanced encryption standard (AES)

Question 9

Which service is included in a secure access service edge (SASE) solution, but not in a security service edge (SSE) solution? (Choose one answer)

Options:

A.

SWG

B.

SD-WAN1

C.

CASB

D.

ZTNA

Question 10

An organization needs to resolve internal hostnames using its internal rather than public DNS servers for remotely connected endpoints. Which two components must be configured on FortiSASE to achieve this? (Choose two.)

Options:

A.

SSL deep inspection

B.

Split DNS rules

C.

Split tunnelling destinations

D.

DNS filter

Question 11

When deploying FortiSASE agent-based clients, which three features are available compared to an agentless solution? (Choose three.)

Options:

A.

Vulnerability scan

B.

SSL inspection

C.

Anti-ransomware protection

D.

Web filter

E.

ZTNA tags

Question 12

Which secure internet access (SIA) use case minimizes individual workstation or device setup, because you do not need to install FortiClient on endpoints or configure explicit web proxy settings on web browser-based end points?

Options:

A.

SIA for inline-CASB users

B.

SIA for agentless remote users

C.

SIA for SSLVPN remote users

D.

SIA for site-based remote users

Question 13

Refer to the exhibits.

as

Jumpbox and Windows-AD are endpoints from the same remote location. Jumpbox can access the internet through FortiSASE, while Windows-AD can no longer access the internet. Based on the information in the exhibits, which reason explains the outage on Windows-AD? (Choose one answer)

Options:

A.

The device security posture for Windows-AD has changed.

B.

The FortiClient version installed on Windows-AD does not match the expected version on FortiSASE.

C.

Windows-AD is excluded from FortiSASE management.

D.

The remote VPN user on Windows-AD no longer matches any VPN policy.

Question 14

A customer wants to upgrade their legacy on-premises proxy to a could-based proxy for a hybrid network. Which FortiSASE features would help the customer to achieve this outcome?

Options:

A.

SD-WAN and NGFW

B.

SD-WAN and inline-CASB

C.

zero trust network access (ZTNA) and next generation firewall (NGFW)

D.

secure web gateway (SWG) and inline-CASB

Question 15

Refer to the exhibit.

as

Which two statements about the onboarding process shown in the exhibit are true? (Choose two answers)

Options:

A.

The user must manually select which FortiSASE components to install during the FortiClient setup.

B.

Depending on the installer used, the invitation code step may be skipped.

C.

The invitation code must always be entered manually after installing FortiClient.

D.

This is an email from the FortiSASE platform to an end user.

Question 16

A customer configured the On/off-net detection rule to disable FortiSASE VPN auto-connect when users are inside the corporate network. The rule is set to Connects with a known public IP using the company’s public IP address. However, when the users are on the corporate network, the FortiSASE VPN still auto-connects. The customer has confirmed that traffic is going to the internet with the correct IP address.

as

Which configuration is causing the issue? (Choose one answer)

Options:

A.

The On-net rule set configuration is incorrect.

B.

Allow local LAN access when endpoint is on-net is disabled when it should be enabled.

C.

Exempt endpoint from FortiSASE auto-connect is disabled when it should be enabled.

D.

Is connected to a known DNS server should be enabled and configured.

Question 17

What is the role of ZTNA tags in the FortiSASE Secure Internet Access (SIA) and Secure Private Access (SPA) use cases? (Choose one answer)

Options:

A.

ZTNA tags are created to isolate browser sessions in SIA and enforce data loss prevention in SPA for all devices.

B.

ZTNA tags determine device posture for non-web traffic protocols and are applied only in agentless deployments for SIA.

C.

ZTNA tags determine device posture for endpoints running FortiClient and are used to grant or deny access in SIA or SPA based on that posture.

D.

ZTNA tags are applied to unmanaged endpoints without FortiClient to secure HTTP and HTTPS traffic in SIA and SPA.

Question 18

Which three traffic flows are supported by FortiSASE Secure Private Access (SPA)? (Choose three answers)

Options:

A.

From private resources to FortiSASE agent-based users.

B.

From private resources to the internet.

C.

From agent-based users to private resources behind the Fortinet SD-WAN.

D.

From private resources to other private resources (SPA to SPA).

E.

From thin branches/branch on-ramp to private resources behind the Fortinet SD-WAN.

Question 19

Refer to the exhibits.

as

as

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The VPN tunnel does not establish

Based on the provided configuration, what configuration needs to be modified to bring the tunnel up?

Options:

A.

NAT needs to be enabled in the Spoke-to-Hub firewall policy.

B.

The BGP router ID needs to match on the hub and FortiSASE.

C.

FortiSASE spoke devices do not support mode config.

D.

The hub needs IKEv2 enabled in the IPsec phase 1 settings.

Question 20

Refer to the exhibits.

as

An endpoint is assigned an IP address of 192.168.13.101/24. Which action will be run on the endpoint? (Choose one answer)

Options:

A.

The endpoint will be able to bypass the on-net rule because it is connecting from a known subnet.

B.

The endpoint will be detected as off-net.

C.

The endpoint will be exempted from auto-connect to the FortiSASE tunnel.

D.

The endpoint will automatically connect to the FortiSASE tunnel.

Question 21

An organization wants to block all video and audio application traffic but grant access to videos from CNN Which application override action must you configure in the Application Control with Inline-CASB?

Options:

A.

Allow

B.

Pass

C.

Permit

D.

Exempt

Question 22

Which two statements about FortiSASE Geofencing with regional compliance are true? (Choose two answers)

Options:

A.

You can configure regional compliance on the security POP or the on-premises device, not both.1

B.

If no regional compliance rule is configured, the connection is made to the closest security POP.

C.

A regional compliance rule can connect only to an on-premises device or only to a security POP.2

D.

The connection order for a regional compliance rule is always the security POP first, followed by the on-premises device.

Question 23

You are configuring FortiSASE SSL deep inspection. What is required for FortiSASE to inspect encrypted traffic? (Choose one answer)

Options:

A.

FortiSASE uses a third-party CA certificate without importing it to client machines, and SSL deep inspection supports only web filtering and application control.

B.

FortiSASE acts as a root CA without needing a certificate, and SSL deep inspection is used only for split DNS and video filtering.

C.

FortiSASE requires an external CA to issue certificates to client machines, and SSL deep inspection supports only antivirus and file filter.

D.

FortiSASE acts as a certificate authority (CA) with a self-signed or internal CA certificate, requiring the root CA certificate to be imported into client machines.

Question 24

One user has reported connectivity issues; no other users have reported problems. Which tool can the administrator use to identify the problem? (Choose one answer)

Options:

A.

Mobile device management (MDM) service to troubleshoot the connectivity issue.

B.

Digital experience monitoring (DEM) to evaluate the performance metrics of the remote computer.

C.

Forensics service to obtain detailed information about the user's remote computer performance.

D.

SOC-as-a-Service (SOCaaS) to get information about the user's remote computer.

Page: 1 / 8
Total 81 questions