Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Certified Solution Specialist > FCSS_SASE_AD-25

FCSS_SASE_AD-25 FCSS - FortiSASE 25 Administrator Question and Answers

Question # 4

How does FortiSASE hide user information when viewing and analyzing logs?

A.

By tokenization in log data

B.

By masking log data

C.

By compressing log data

D.

By hashing log data

Full Access
Question # 5

Refer to the exhibit.

Based on the configuration shown, in which two ways will FortiSASE process sessions that require FortiSandbox inspection? (Choose two.)

A.

Only endpoints assigned a profile for sandbox detection will be processed by the sandbox feature.

B.

FortiClient quarantines only infected files that FortiSandbox detects as medium level.

C.

All files executed on a USB drive will be sent to FortiSandbox for analysis.

D.

All files will be sent to a on-premises FortiSandbox for inspection.

Full Access
Question # 6

An organization must block user attempts to log in to non-company resources while using Microsoft Office 365 to prevent users from accessing unapproved cloud resources.

Which FortiSASE feature can you implement to meet this requirement?

A.

application control with inline-CASB

B.

data loss prevention (DLP) with Microsoft Purview Information Protection (MPIP)

C.

web filter with inline-CASB

D.

DNS filter with domain filter

Full Access
Question # 7

Refer to the exhibits.

A FortiSASE administrator has configured FortiSASE as a spoke to a FortiGate hub. The tunnel is up to the FortiGate hub. However, the remote FortiClient is not able to access the web server hosted behind the FortiGate hub.

Based on the exhibits, what is the reason for the access failure?

A.

A private access policy has denied the traffic because of failed compliance

B.

The hub is not advertising the required routes.

C.

The hub firewall policy does not include the FortiClient address range.

D.

The server subnet BGP route was not received on FortiSASE.

Full Access
Question # 8

Refer to the exhibits.

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub.

The VPN tunnel does not establish.

Which configuration needs to be modified to bring the tunnel up?

A.

FortiSASE spoke devices do not support mode config.

B.

The network overlay ID must match on FortiSASE and the hub.

C.

The BGP router ID must match on the hub and FortiSASE.

D.

Auto-discovery-sender must be disabled on IPsec phase1 settings.

Full Access
Question # 9

What is the recommended method to upgrade FortiClient in a FortiSASE deployment?

A.

Remote users must upgrade the FortiClient manually.

B.

FortiSASE automatically upgrades FortiClient when a new version is released.

C.

The FortiSASE administrator must assign endpoint groups to an endpoint upgrade rule.

D.

The FortiSASE administrator will upload the desired FortiClient version to the FortiSASE portal and push it to endpoints.

Full Access
Question # 10

Which FortiSASE feature ensures least-privileged user access to corporate applications that are protected by an on-premises FortiGate device?

A.

secure web gateway (SWG)

B.

zero trust network access (ZTNA)

C.

cloud access security broker (CASB)

D.

remote browser isolation (RBI)

Full Access
Question # 11

Which information can an administrator monitor using reports generated on FortiSASE?

A.

sanctioned and unsanctioned Software-as-a-Service (SaaS) applications usage

B.

FortiClient vulnerability assessment

C.

SD-WAN performance

D.

FortiSASE administrator and system events

Full Access
Question # 12

Refer to the exhibits.

Antivirus is installed on a Windows 10 endpoint, but the windows application firewall is stopping it from running.

What will the endpoint security posture check be?

A.

FortiClient will tag the endpoint as FortiSASE-Non-Compliant.

B.

FortiClient will be unmanaged from FortiSASE due to failed compliance.

C.

FortiClient will trigger network lockdown on the endpoint.

D.

FortiClient will prompt the user to enable antivirus.

Full Access
Question # 13

What are two benefits of deploying secure private access with SD-WAN? (Choose two.)

A.

a direct access proxy tunnel from FortiClient to the on-premises FortiGate

B.

ZTNA posture check performed by the hub FortiGate

C.

support of both TCP and UDP applications

D.

inline security inspection by FortiSASE

Full Access
Question # 14

Your organization is currently using FortiSASE for its cybersecurity. They have recently hired a contractor who will work from the HQ office and who needs temporary internet access in order to set up a web-based point of sale (POS) system.

What is the recommended way to provide internet access to the contractor?

A.

Use zero trust network access (ZTNA) and tag the client as an unmanaged endpoint.

B.

Use the self-registration portal on FortiSASE to grant internet access.

C.

Use a tunnel policy with a contractors user group as the source on FortiSASE to provide internet access.

D.

Use a proxy auto-configuration (PAC) file and provide secure web gateway (SWG) service as an explicit web proxy.

Full Access
Question # 15

In the Secure Private Access (SPA) use case, which two FortiSASE features facilitate access to corporate applications? (Choose two.)

A.

cloud access security broker (CASB)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin edge

Full Access