New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Network Security Expert > NSE5_SSE_AD-7.6

NSE5_SSE_AD-7.6 Fortinet NSE 5 - FortiSASE and SD-WAN 7.6 Core Administrator Question and Answers

Question # 4

Which three FortiSASE use cases are possible? (Choose three answers)

A.

Secure Internet Access (SIA)

B.

Secure SaaS Access (SSA)

C.

Secure Private Access (SPA)

D.

Secure VPN Access (SVA)

E.

Secure Browser Access (SBA)

Full Access
Question # 5

Which configuration is a valid use case for FortiSASE features in supporting remote users?

A.

Enabling secure SaaS access through SD-WAN integration, protecting against web-based threats with data loss prevention, and monitoring user connectivity with shadow IT visibility.

B.

Monitoring SaaS application performance, isolating browser sessions for all websites, and integrating with SD-WAN for data loss prevention.

C.

Enabling secure web browsing to protect against threats, providing explicit application access with zero-trust or SD-WAN integration, and addressing shadow IT visibility with data loss prevention.

D.

Providing secure web browsing through remote browser isolation, addressing shadow IT with zero-trust access, and protecting data at rest only.

Full Access
Question # 6

How does the FortiSASE security dashboard facilitate vulnerability management for FortiClient endpoints? (Choose one answer)

A.

It automatically patches all vulnerabilities without user intervention and does not categorize vulnerabilities by severity.

B.

It shows vulnerabilities only for applications and requires endpoint users to manually check for affected endpoints.

C.

It displays only critical vulnerabilities, requires manual patching for all endpoints, and does not allow viewing of affected endpoints.

D.

It provides a vulnerability summary, identifies affected endpoints, and supports automatic patching for eligible vulnerabilities.

Full Access
Question # 7

SD-WAN interacts with many other FortiGate features. Some of them are required to allow SD-WAN to steer the traffic.

Which three configuration elements must you configure before FortiGate can steer traffic according to SD-WAN rules? (Choose three.)

A.

Firewall policies

B.

Security profiles

C.

Interfaces

D.

Routing

E.

Traffic shaping

Full Access
Question # 8

For a small site, an administrator plans to implement SD-WAN and ensure high network availability for business-critical applications while limiting the overall cost and the cost of pay-per-use backup connections.

Which action must the administrator take to accomplish this plan?

A.

Use a mid-range FortiGate device to implement standalone SD-WAN.

B.

Implement dynamic routing.

C.

Set up a high availability (HA) cluster to implement standalone SD-WAN.

D.

Configure at least two WAN links.

Full Access
Question # 9

What is the purpose of the on/off-net rule setting in FortiSASE?

A.

To enable or disable user authentication for external network access.

B.

To define different traffic routing rules for on-premises and cloud-based resources.

C.

To determine if an endpoint is connecting from a trusted network or untrusted location.

D.

To configure different access policies for users based on their geographical location.

Full Access
Question # 10

Refer to the exhibits.

Two SD-WAN event logs, the member status, the SD-WAN rule configuration, and the health-check configuration for a FortiGate device are shown. Immediately after the log messages are displayed, how will the FortiGate steer the traffic based on the information shown in the exhibits? (Choose one answer)

A.

FortiGate uses port1 or port2 to steer the traffic for SD-WAN rule ID 1.

B.

FortiGate uses port1 to steer the traffic for SD-WAN rule ID 1.

C.

FortiGate uses port2 to steer the traffic for SD-WAN rule ID 1.

D.

FortiGate skips SD-WAN rule ID 1.

Full Access