New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Network Security Expert > NSE7_SSE_AD-25

NSE7_SSE_AD-25 Fortinet NSE 7 - FortiSASE 25 Enterprise Administrator Question and Answers

Question # 4

Which statement about FortiSASE and SAML is true? (Choose one answer)

A.

FortiSASE acts as the SP, relies on an external IdP, and can use SAML group matching.

B.

FortiSASE supports SAML login but cannot use SAML group matching.

C.

FortiSASE acts as the IdP and can perform SAML group matching internally.

D.

FortiSASE includes IdP functionality and uses it for SAML group matching.

Full Access
Question # 5

How does FortiSASE address the market trends of multicloud and Software-as-a-Service (SaaS) adoption, hybrid workforce, and zero trust? (Choose one answer)

A.

It focuses solely on securing on-premises networks, ignoring cloud and remote work challenges.

B.

It prioritizes legacy VPN connections for hybrid workforces, bypassing modern cloud and zero-trust security measures.

C.

It provides visibility and control for multicloud and SaaS environments, ensures secure and seamless access for hybrid workforces, and implements zero-trust principles.1

D.

It supports only zero-trust frameworks without addressing multicloud or hybrid workforce needs.

Full Access
Question # 6

What is required to enable the MSSP feature on FortiSASE? (Choose one answer)

A.

Multi-tenancy must be enabled on the FortiSASE portal.

B.

MSSP user accounts and permissions must be configured on the FortiSASE portal.

C.

The MSSP add-on license must be applied to FortiSASE.

D.

Role-based access control (RBAC) must be assigned to identity and access management (IAM) users using the FortiCloud IAM portal.

Full Access
Question # 7

Refer to the exhibit.

To allow access, which web tiller configuration must you change on FortiSASE?

A.

FortiGuard category-based filter

B.

content filter

C.

URL Filter

D.

inline cloud access security broker (CASB) headers

Full Access
Question # 8

What are two benefits of deploying secure private access (SPA) with SD-WAN? (Choose two answers)

A.

ZTNA posture check performed by the hub FortiGate

B.

Support of both TCP and UDP applications

C.

A direct access proxy tunnel from FortiClient to the on-premises FortiGate

D.

Inline security inspection by FortiSASE

Full Access
Question # 9

Which two components are part of onboarding a secure web gateway (SWG) endpoint? (Choose two)

A.

FortiSASE CA certificate

B.

proxy auto-configuration (PAC) file

C.

FortiSASE invitation code

D.

FortiClient installer

Full Access
Question # 10

Refer to the exhibits.

WiMO-Pro and Win7-Pro are endpoints from the same remote location. WiMO-Pro can access the internet though FortiSASE, while Wm7-Pro can no longer access the internet

Given the exhibits, which reason explains the outage on Wm7-Pro?

A.

The Win7-Pro device posture has changed.

B.

Win7-Pro cannot reach the FortiSASE SSL VPN gateway

C.

The Win7-Pro FortiClient version does not match the FortiSASE endpoint requirement.

D.

Win-7 Pro has exceeded the total vulnerability detected threshold.

Full Access
Question # 11

Refer to the exhibit.

A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.

Which configuration must you apply to achieve this requirement?

A.

Exempt the Google Maps FQDN from the endpoint system proxy settings.

B.

Configure a static route with the Google Maps FQDN on the endpoint to redirect traffic

C.

Configure the Google Maps FQDN as a split tunneling destination on the FortiSASE endpoint profile.

D.

Change the default DNS server configuration on FortiSASE to use the endpoint system DNS.

Full Access
Question # 12

What are two advantages of using zero-trust tags? (Choose two.)

A.

Zero-trust tags can be used to allow or deny access to network resources

B.

Zero-trust tags can determine the security posture of an endpoint.

C.

Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints

D.

Zero-trust tags can be used to allow secure web gateway (SWG) access

Full Access
Question # 13

Refer to the exhibits.

An endpoint is assigned an IP address of 192.168.13.101/24. Which action will be run on the endpoint? (Choose one answer)

A.

The endpoint will be able to bypass the on-net rule because it is connecting from a known subnet.

B.

The endpoint will be detected as off-net.

C.

The endpoint will be exempted from auto-connect to the FortiSASE tunnel.

D.

The endpoint will automatically connect to the FortiSASE tunnel.

Full Access
Question # 14

One user has reported connectivity issues; no other users have reported problems. Which tool can the administrator use to identify the problem? (Choose one answer)

A.

Mobile device management (MDM) service to troubleshoot the connectivity issue.

B.

Digital experience monitoring (DEM) to evaluate the performance metrics of the remote computer.

C.

Forensics service to obtain detailed information about the user's remote computer performance.

D.

SOC-as-a-Service (SOCaaS) to get information about the user's remote computer.

Full Access
Question # 15

You are configuring FortiSASE SSL deep inspection. What is required for FortiSASE to inspect encrypted traffic? (Choose one answer)

A.

FortiSASE uses a third-party CA certificate without importing it to client machines, and SSL deep inspection supports only web filtering and application control.

B.

FortiSASE acts as a root CA without needing a certificate, and SSL deep inspection is used only for split DNS and video filtering.

C.

FortiSASE requires an external CA to issue certificates to client machines, and SSL deep inspection supports only antivirus and file filter.

D.

FortiSASE acts as a certificate authority (CA) with a self-signed or internal CA certificate, requiring the root CA certificate to be imported into client machines.

Full Access
Question # 16

You are designing a new network for Company X and one of the new cybersecurity policy requirements is that all remote user endpoints must always be connected and protected Which FortiSASE component facilitates this always-on security measure?

A.

site-based deployment

B.

thin-branch SASE extension

C.

unified FortiClient

D.

inline-CASB

Full Access
Question # 17

You have configured FortiSASE Secure Private Access (SPA) deployment. Which statement is true about traffic flows? (Choose two answers)

A.

When using SD-WAN private access, traffic goes from an endpoint directly to an SPA hub.

B.

When using zero trust network access, traffic goes from an endpoint to a FortiSASE POP, and then to a ZTNA access proxy.

C.

When using zero trust network access (ZTNA) traffic goes from an endpoint directly to a ZTNA access proxy.

D.

When using SD-WAN private access, traffic goes from an endpoint to a FortiSASE POP, and then to an SPA hub.

Full Access
Question # 18

What is the purpose of the grace period for off-net endpoints in the FortiSASE Network Lockdown feature? (Choose one answer)

A.

To allow users to attempt VPN reconnection before restrictions are applied1

B.

To bypass security policies for specific applications

C.

To permanently block network access for non-compliant endpoints

D.

To automatically reset the FortiClient configuration

Full Access
Question # 19

A customer wants to upgrade their legacy on-premises proxy to a could-based proxy for a hybrid network. Which FortiSASE features would help the customer to achieve this outcome?

A.

SD-WAN and NGFW

B.

SD-WAN and inline-CASB

C.

zero trust network access (ZTNA) and next generation firewall (NGFW)

D.

secure web gateway (SWG) and inline-CASB

Full Access
Question # 20

Refer to the exhibit.

An SPA service connection is experiencing connectivity problems. Which configuration setting should the administrator verify and correct first? (Choose one answer)

A.

Remote Gateway

B.

BGP Peer IP

C.

Network overlay ID

D.

Authentication Method

Full Access
Question # 21

How does FortiSASE hide user information when viewing and analyzing logs?

A.

By hashing data using Blowfish

B.

By hashing data using salt

C.

By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)

D.

By encrypting data using advanced encryption standard (AES)

Full Access
Question # 22

Which two advantages does FortiSASE bring to businesses with multiple branch offices? (Choose two.)

A.

It offers centralized management for simplified administration.

B.

It enables seamless integration with third-party firewalls.

C.

it offers customizable dashboard views for each branch location

D.

It eliminates the need to have an on-premises firewall for each branch.

Full Access
Question # 23

When viewing the daily summary report generated by FortiSASE. the administrator notices that the report contains very little data. What is a possible explanation for this almost empty report?

A.

Digital experience monitoring is not configured.

B.

Log allowed traffic is set to Security Events for all policies.

C.

The web filter security profile is not set to Monitor

D.

There are no security profile group applied to all policies.

Full Access
Question # 24

Refer to the exhibit.

A customer wants to fine-tune network assignments on FortiSASE, so they modified the IPAM configuration as shown in the exhibit. After this configuration, the customer started having connectivity problems and noticed that devices are using excluded ranges. What could be causing the unexpected behavior and connectivity problems? (Choose two answers)

A.

The pool must include at least one /20 per security POP for the IPAM to work correctly.

B.

The pool must include at least one /16 per Instance for the IPAM to work correctly.

C.

The pool must include at least one /20 per Instance for the IPAM to work correctly.

D.

The customer excluded too many networks from the pool.

Full Access