Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet NSE5_SSE_AD-7.6 Fortinet NSE 5 - FortiSASE and SD-WAN 7.6 Core Administrator Exam Practice Test

Fortinet NSE 5 - FortiSASE and SD-WAN 7.6 Core Administrator Questions and Answers

Question 1

Question # 1

An administrator is troubleshooting SD-WAN on FortiGate. A device behind branch1_fgt generates traffic to the 10.0.0.0/8 network. The administrator expects the traffic to match SD-WAN rule ID 1 and be routed over HUB1-VPN1. However, the traffic is routed over HUB1-VPN3.

Based on the output shown in the exhibit, which two reasons, individually or together, could explain the observed behavior? (Choose two.)

Options:

A.

HUB1-VPN1 does not have a valid route to the destination.

B.

HUB1-VPN3 has a higher member configuration priority than HUB1-VPN1.

C.

HUB1-VPN3 has a lower route priority value (higher priority) than HUB1-VPN1.

D.

The traffic matches a regular policy route configured with HUB1-VPN3 as the outgoing device.

Question 2

Which configuration is a valid use case for FortiSASE features in supporting remote users?

Options:

A.

Enabling secure SaaS access through SD-WAN integration, protecting against web-based threats with data loss prevention, and monitoring user connectivity with shadow IT visibility.

B.

Monitoring SaaS application performance, isolating browser sessions for all websites, and integrating with SD-WAN for data loss prevention.

C.

Enabling secure web browsing to protect against threats, providing explicit application access with zero-trust or SD-WAN integration, and addressing shadow IT visibility with data loss prevention.

D.

Providing secure web browsing through remote browser isolation, addressing shadow IT with zero-trust access, and protecting data at rest only.

Question 3

Which statement is true about FortiSASE supported deployment?

Options:

A.

FortiSASE supports VPN mode and Agentless mode, based on user requirements.

B.

FortiSASE supports both Endpoint mode and SWG mode, depending on deployment.

C.

FortiSASE operates only in SWG mode, where all traffic is forced through FortiSASE POPs.

D.

FortiSASE relies on ZTNA-only mode, which replaces SWG and endpoint functions.

Question 4

Refer to the exhibit.

Question # 4

The SD-WAN rule status and configuration is shown. Based on the exhibit, which change in the measured latency will first make HUB1-VPN3 the new preferred member?

Options:

A.

When HUB1-VPN3 has a latency of 80 ms

B.

When HUB1-VPN3 has a lower latency than HUB1-VPN1 and HUB1-VPN2

C.

When HUB1-VPN1 has a latency of 200 ms

D.

When HUB1-VPN3 has a latency of 90 ms

Question 5

You have a FortiGate configuration with three user-defined SD-WAN zones and one or two members in each of these zones. One SD-WAN member is no longer used in health-check and SD-WAN rules. This member is the only member of its zone. You want to delete it.

What happens if you delete the SD-WAN member from the FortiGate GUI?

Options:

A.

FortiGate displays an error message. SD-WAN zones must contain at least one member.

B.

FortiGate accepts the deletion and removes static routes as required.

C.

FortiGate accepts the deletion with no further action.

D.

FortiGate accepts the deletion and places the member in the default SD-WAN zone.

Question 6

For a small site, an administrator plans to implement SD-WAN and ensure high network availability for business-critical applications while limiting the overall cost and the cost of pay-per-use backup connections.

Which action must the administrator take to accomplish this plan?

Options:

A.

Use a mid-range FortiGate device to implement standalone SD-WAN.

B.

Implement dynamic routing.

C.

Set up a high availability (HA) cluster to implement standalone SD-WAN.

D.

Configure at least two WAN links.

Question 7

Refer to the exhibit.

Question # 7

Which two statements about the Vulnerability summary dashboard in FortiSASE are correct? (Choose two.)

Options:

A.

The dashboard shows the vulnerability score for unknown applications.

B.

Vulnerability scan is disabled in the endpoint profile.

C.

The dashboard allows the administrator to drill down and view CVE data and severity classifications.

D.

Automatic vulnerability patching can be enabled for supported applications.

Question 8

How is the Geofencing feature used in FortiSASE? (Choose one answer)

Options:

A.

To allow or block remote user connections to FortiSASE POPs from specific countries.

B.

To restrict access to applications based on the time of day in specific countries.

C.

To encrypt data at rest on mobile devices in specific countries.

D.

To monitor user behavior on websites and block non-work-related content from specific countries

Question 9

Which two statements correctly describe what happens when traffic matches the implicit SD-WAN rule? (Choose two answers)

Options:

A.

Traffic is load balanced using the algorithm set for the v4-ecmp-mode setting.

B.

Traffic does not match any of the entries in the policy route table.

C.

FortiGate flags the session with may_dirty and vwl_default.

D.

The traffic is distributed, regardless of weight, through all available static routes.

E.

The session information output displays no SD-WAN service id.

Question 10

Which two delivery methods are used for installing FortiClient on a user's laptop? (Choose two.)

Options:

A.

Use zero-touch installation through a third-party application store.

B.

Download the installer directly from the FortiSASE portal.

C.

Send an invitation email to selected users containing links to FortiClient installers.

D.

Configure automatic installation through an API to the user's laptop.