Big Halloween Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet FCSS_SASE_AD-25 FCSS - FortiSASE 25 Administrator Exam Practice Test

Page: 1 / 5
Total 53 questions

FCSS - FortiSASE 25 Administrator Questions and Answers

Question 1

Which statement best describes the Digital Experience Monitor (DEM) feature on FortiSASE?

Options:

A.

It provides end-to-end network visibility from all the FortiSASE security PoPs to a specific SaaS application.

B.

It gathers all the vulnerability information from all the FortiClient endpoints.

C.

It is used for performing device compliance checks on endpoints.

D.

It monitors the FortiSASE POP health based on ping probes.

Question 2

A customer wants to upgrade their legacy on-premises proxy to a cloud-based proxy for a hybrid network.

Which two FortiSASE features would help the customer achieve this outcome? (Choose two.)

Options:

A.

secure web gateway (SWG)

B.

zero trust network access (ZTNA)

C.

sandbox cloud

D.

inline-CASB

Question 3

Refer to the exhibits.

Question # 3

Question # 3

Question # 3

Question # 3

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub.

The VPN tunnel does not establish.

Which configuration needs to be modified to bring the tunnel up?

Options:

A.

FortiSASE spoke devices do not support mode config.

B.

The network overlay ID must match on FortiSASE and the hub.

C.

The BGP router ID must match on the hub and FortiSASE.

D.

Auto-discovery-sender must be disabled on IPsec phase1 settings.

Question 4

Which two are required to enable central management on FortiSASE? (Choose two.)

Options:

A.

FortiSASE connector configured on FortiManager.

B.

FortiSASE central management entitlement applied to FortiManager.

C.

The FortiManager IP address in the FortiSASE central management configuration.

D.

FortiManager and FortiSASE registered under the same FortiCloud account.

Question 5

Which FortiSASE feature ensures least-privileged user access to corporate applications that are protected by an on-premises FortiGate device?

Options:

A.

secure web gateway (SWG)

B.

zero trust network access (ZTNA)

C.

cloud access security broker (CASB)

D.

remote browser isolation (RBI)

Question 6

Which description of the FortiSASE inline-CASB component is true?

Options:

A.

It has limited visibility when data is transmitted.

B.

It detects data in motion.

C.

It is placed outside the traffic path.

D.

It relies on API to integrate with cloud services.

Question 7

What are two advantages of using zero-trust tags? (Choose two.)

Options:

A.

Zero-trust tags can determine the security posture of an endpoint.

B.

Zero-trust tags can be assigned to endpoint profiles based on user groups.

C.

Zero-trust tags can be used to allow or deny access to network resources.

D.

Zero-trust tags can help monitor endpoint system resource usage.

Question 8

Which information does FortiSASE use to bring network lockdown into effect on an endpoint?

Options:

A.

Zero-day malware detection on endpoint

B.

The number of critical vulnerabilities detected on the endpoint

C.

The security posture of the endpoint based on ZTNA tags

D.

The connection status of the tunnel to FortiSASE

Question 9

What is required to enable the MSSP feature on FortiSASE?

Options:

A.

Role-based access control (RBAC) must be assigned to identity and access management (IAM) users using the FortiCloud IAM portal.

B.

The MSSP add-on license must be applied to FortiSASE.

C.

MSSP user accounts and permissions must be configured on the FortiSASE portal.

D.

Multi-tenancy must be enabled on the FortiSASE portal.

Question 10

Which two components are part of onboarding a secure web gateway (SWG) endpoint for secure internet access (SIA)? (Choose two.)

Options:

A.

proxy auto-configuration (PAC) file

B.

FortiSASE certificate authority (CA) certificate

C.

FortiClient software

D.

tunnel policy

Question 11

For monitoring potentially unwanted applications on endpoints, which information is available on the FortiSASE software installations page?

Options:

A.

the vendor of the software

B.

the endpoint the software is installed on

C.

the license status of the software

D.

the usage frequency of the software

Question 12

A company must provide access to a web server through FortiSASE secure private access for contractors.

What is the recommended method to provide access?

Options:

A.

Configure a TCP access proxy forwarding rule and push it to the contractor FortiClient endpoint.

B.

Update the DNS records on the endpoint to access private applications.

C.

Publish the web server URL on a bookmark portal and share it with contractors.

D.

Update the PAC file with the web server URL and share it with contractors.

Question 13

Which authentication method overrides any other previously configured user authentication on FortiSASE?

Options:

A.

MFA

B.

Local

C.

RADIUS

D.

SSO

Question 14

In a FortiSASE SD-WAN deployment with dual hubs, what are two benefits of assigning hubs with different priorities? (Choose two.)

Options:

A.

optimized performance that meets the minimum SLA requirements

B.

load balancing based on session identification

C.

bandwidth allocated traffic shaping

D.

redundancy to seamlessly steer traffic

Question 15

Refer to the exhibit.

Question # 15

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.

In this scenario, which two setups will achieve these requirements? (Choose two.)

Options:

A.

Configure ZTNA servers and ZTNA policies on FortiGate.

B.

Configure FortiGate as a zero trust network access (ZTNA) access proxy.

C.

Configure ZTNA tags on FortiGate.

D.

Configure private access policies on FortiSASE with ZTNA.

Page: 1 / 5
Total 53 questions