Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet FCSS_SASE_AD-25 FCSS - FortiSASE 25 Administrator Exam Practice Test

Page: 1 / 5
Total 51 questions

FCSS - FortiSASE 25 Administrator Questions and Answers

Question 1

Refer to the exhibit.

Question # 1

While reviewing the traffic logs, the FortiSASE administrator notices that the usernames are showing random characters.

Why are the usernames showing random characters?

Options:

A.

Log anonymization is turned on to hash usernames.

B.

Special characters are used in usernames.

C.

Users are using a shared single sign-on SSO username.

D.

FortiSASE uses FortiClient unique identifiers for usernames.

Question 2

Refer to the exhibit.

Question # 2

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.

In this scenario, which two setups will achieve these requirements? (Choose two.)

Options:

A.

Configure ZTNA servers and ZTNA policies on FortiGate.

B.

Configure FortiGate as a zero trust network access (ZTNA) access proxy.

C.

Configure ZTNA tags on FortiGate.

D.

Configure private access policies on FortiSASE with ZTNA.

Question 3

Which description of the FortiSASE inline-CASB component is true?

Options:

A.

It has limited visibility when data is transmitted.

B.

It detects data in motion.

C.

It is placed outside the traffic path.

D.

It relies on API to integrate with cloud services.

Question 4

What can be configured on FortiSASE as an additional layer of security for FortiClient registration?

Options:

A.

security posture tags

B.

application inventory

C.

user verification

D.

device identification

Question 5

Which two are required to enable central management on FortiSASE? (Choose two.)

Options:

A.

FortiSASE connector configured on FortiManager.

B.

FortiManager and FortiSASE registered under the same FortiCloud account.

C.

The FortiManager IP address in the FortiSASE central management configuration.

D.

FortiSASE central management entitlement applied to FortiManager.

Question 6

What is the recommended method to upgrade FortiClient in a FortiSASE deployment?

Options:

A.

Remote users must upgrade the FortiClient manually.

B.

FortiSASE automatically upgrades FortiClient when a new version is released.

C.

The FortiSASE administrator must assign endpoint groups to an endpoint upgrade rule.

D.

The FortiSASE administrator will upload the desired FortiClient version to the FortiSASE portal and push it to endpoints.

Question 7

Which FortiSASE feature ensures least-privileged user access to corporate applications that are protected by an on-premises FortiGate device?

Options:

A.

secure web gateway (SWG)

B.

zero trust network access (ZTNA)

C.

cloud access security broker (CASB)

D.

remote browser isolation (RBI)

Question 8

How does FortiSASE hide user information when viewing and analyzing logs?

Options:

A.

By tokenization in log data

B.

By masking log data

C.

By compressing log data

D.

By hashing log data

Question 9

Which secure internet access (SIA) use case minimizes individual endpoint configuration?

Options:

A.

Agentless remote user internet access

B.

Site-based remote user internet access

C.

SIA using ZTNA

D.

SIA for FortiClient agent remote users

Question 10

When accessing the FortiSASE portal for the first time, an administrator must select data center locations for which three FortiSASE components? (Choose three.)

Options:

A.

Identity & access management (IAM)

B.

Points of presence

C.

Endpoint management

D.

Logging

E.

Sandbox

Question 11

Refer to the exhibit.

Question # 11

The daily report for application usage for internet traffic shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

Options:

A.

Certificate inspection is not being used to scan application traffic.

B.

Deep inspection is not being used to scan traffic.

C.

The private access policy must be to set to log Security Events.

D.

The inline-CASB application control profile does not have application categories set to Monitor.

Question 12

Your organization is currently using FortiSASE for its cybersecurity. They have recently hired a contractor who will work from the HQ office and who needs temporary internet access in order to set up a web-based point of sale (POS) system.

What is the recommended way to provide internet access to the contractor?

Options:

A.

Use zero trust network access (ZTNA) and tag the client as an unmanaged endpoint.

B.

Use the self-registration portal on FortiSASE to grant internet access.

C.

Use a tunnel policy with a contractors user group as the source on FortiSASE to provide internet access.

D.

Use a proxy auto-configuration (PAC) file and provide secure web gateway (SWG) service as an explicit web proxy.

Question 13

Which information can an administrator monitor using reports generated on FortiSASE?

Options:

A.

sanctioned and unsanctioned Software-as-a-Service (SaaS) applications usage

B.

FortiClient vulnerability assessment

C.

SD-WAN performance

D.

FortiSASE administrator and system events

Question 14

Which service is included in a secure access service edge (SASE) solution, but not in a security service edge (SSE) solution?

Options:

A.

ZTNA

B.

SD-WAN

C.

SWG

D.

CASB

Question 15

Refer to the exhibit.

Question # 15

Based on the configuration shown, in which two ways will FortiSASE process sessions that require FortiSandbox inspection? (Choose two.)

Options:

A.

Only endpoints assigned a profile for sandbox detection will be processed by the sandbox feature.

B.

FortiClient quarantines only infected files that FortiSandbox detects as medium level.

C.

All files executed on a USB drive will be sent to FortiSandbox for analysis.

D.

All files will be sent to a on-premises FortiSandbox for inspection.

Page: 1 / 5
Total 51 questions