Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Certified Solution Specialist > FCSS_SASE_AD-25

FCSS_SASE_AD-25 FCSS - FortiSASE 25 Administrator Question and Answers

Question # 4

Refer to the exhibits.

How will the application vulnerabilities be patched, based on the exhibits provided?

A.

The vulnerability will be patched automatically based on the endpoint profile configuration.

B.

The vulnerability will be patched by installing the patch from the vendor’s website.

C.

The end user will patch the vulnerabilities using the FortiClient software.

D.

An administrator will patch the vulnerability remotely using FortiSASE.

Full Access
Question # 5

In the Secure Private Access (SPA) use case, which two FortiSASE features facilitate access to corporate applications? (Choose two.)

A.

cloud access security broker (CASB)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin edge

Full Access
Question # 6

Which description of the FortiSASE inline-CASB component is true?

A.

It has limited visibility when data is transmitted.

B.

It detects data in motion.

C.

It is placed outside the traffic path.

D.

It relies on API to integrate with cloud services.

Full Access
Question # 7

Which authentication method overrides any other previously configured user authentication on FortiSASE?

A.

MFA

B.

Local

C.

RADIUS

D.

SSO

Full Access
Question # 8

Refer to the exhibits.

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download theeicar.com-zipfile fromhttps://eicar.org.

Which configuration on FortiSASE is allowing users to perform the download?

A- Web filter is allowing the URL.

B. Deep inspection is not enabled.

C. Application control is exempting all the browser traffic.

D. Intrusion prevention is disabled.

Full Access
Question # 9

Refer to the exhibit.

While reviewing the traffic logs, the FortiSASE administrator notices that the usernames are showing random characters.

Why are the usernames showing random characters?

A.

Log anonymization is turned on to hash usernames.

B.

Special characters are used in usernames.

C.

Users are using a shared single sign-on SSO username.

D.

FortiSASE uses FortiClient unique identifiers for usernames.

Full Access
Question # 10

Which statement applies to a single sign-on (SSO) deployment on FortiSASE?

A.

SSO users can be imported into FortiSASE and added to user groups.

B.

SSO is recommended only for agent-based deployments.

C.

SSO overrides any other previously configured user authentication.

D.

SSO identity providers can be integrated using public and private access types.

Full Access
Question # 11

What are two benefits of deploying FortiSASE with FortiGate ZTNA access proxy? (Choose two.)

A.

It offers data center redundancy.

B.

The on-premises FortiGate performs a device posture check.

C.

It is ideal for latency-sensitive applications.

D.

It supports both agentless ZTNA and agent-based ZTNA.

Full Access
Question # 12

An organization must block user attempts to log in to non-company resources while using Microsoft Office 365 to prevent users from accessing unapproved cloud resources.

Which FortiSASE feature can you implement to meet this requirement?

A.

application control with inline-CASB

B.

data loss prevention (DLP) with Microsoft Purview Information Protection (MPIP)

C.

web filter with inline-CASB

D.

DNS filter with domain filter

Full Access
Question # 13

What happens to the logs on FortiSASE that are older than the configured log retention period?

A.

The logs are deleted from FortiSASE.

B.

The logs are indexed and can be stored in a SQL database.

C.

The logs are backed up on FortiCloud.

D.

The logs are compressed and archived.

Full Access
Question # 14

Your FortiSASE customer has a small branch office in which ten users will be using their personal laptops and mobile devices to access the internet.

Which deployment should they use to secure their internet access with minimal configuration?

A.

Deploy FortiGate as a LAN extension to secure internet access.

B.

Deploy FortiAP to secure internet access.

C.

Deploy FortiClient endpoint agent to secure internet access.

D.

Deploy SD-WAN on-ramp to secure internet access.

Full Access
Question # 15

Refer to the exhibit.

The daily report for application usage for internet traffic shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

A.

Certificate inspection is not being used to scan application traffic.

B.

Deep inspection is not being used to scan traffic.

C.

The private access policy must be to set to log Security Events.

D.

The inline-CASB application control profile does not have application categories set to Monitor.

Full Access