New Year Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet NSE7_SSE_AD-25 Fortinet NSE 7 - FortiSASE 25 Enterprise Administrator Exam Practice Test

Fortinet NSE 7 - FortiSASE 25 Enterprise Administrator Questions and Answers

Question 1

Refer to the exhibits.

Question # 1

An endpoint is assigned an IP address of 192.168.13.101/24. Which action will be run on the endpoint? (Choose one answer)

Options:

A.

The endpoint will be able to bypass the on-net rule because it is connecting from a known subnet.

B.

The endpoint will be detected as off-net.

C.

The endpoint will be exempted from auto-connect to the FortiSASE tunnel.

D.

The endpoint will automatically connect to the FortiSASE tunnel.

Question 2

What is the purpose of security posture tagging in ZTNA? (Choose one answer)

Options:

A.

To assign usernames to different devices for security logs

B.

To ensure that all devices and users are monitored continuously

C.

To provide granular access control based on the compliance status of devices and users1

D.

To categorize devices and users based on their role in the organization

Question 3

An existing Fortinet SD-WAN customer is reviewing the FortiSASE ordering guide to identify which add-on is needed to allow future FortiSASE remote users to reach private resources. Which add-on should the customer consider to allow private access? (Choose one answer)

Options:

A.

FortiSASE Global add-on

B.

FortiSASE Branch On-Ramp add-on

C.

FortiSASE SPA add-on

D.

FortiSASE Dedicated Public IP Address add-on

Question 4

Refer to the exhibit.

Question # 4

A customer wants to fine-tune network assignments on FortiSASE, so they modified the IPAM configuration as shown in the exhibit. After this configuration, the customer started having connectivity problems and noticed that devices are using excluded ranges. What could be causing the unexpected behavior and connectivity problems? (Choose two answers)

Options:

A.

The pool must include at least one /20 per security POP for the IPAM to work correctly.

B.

The pool must include at least one /16 per Instance for the IPAM to work correctly.

C.

The pool must include at least one /20 per Instance for the IPAM to work correctly.

D.

The customer excluded too many networks from the pool.

Question 5

In the Secure Private Access (SPA) use case, which two FortiSASE features facilitate access to corporate applications? (Choose two answers)

Options:

A.

SD-WAN

B.

zero trust network access (ZTNA)

C.

thin edge

D.

cloud access security broker (CASB)

Question 6

When viewing the daily summary report generated by FortiSASE. the administrator notices that the report contains very little data. What is a possible explanation for this almost empty report?

Options:

A.

Digital experience monitoring is not configured.

B.

Log allowed traffic is set to Security Events for all policies.

C.

The web filter security profile is not set to Monitor

D.

There are no security profile group applied to all policies.

Question 7

When configuring the DLP rule in FortiSASE using Regex format, what would be the correct order for the configuration steps? (Place the four correct steps in order)

Question # 7

Options:

Question 8

For monitoring potentially unwanted applications on endpoints, which information is available on the FortiSASE software installations page? (Choose two answers)

Options:

A.

The endpoint the software is installed on1

B.

The license status of the software2

C.

The vendor of the software3

D.

The usage frequency of the software

Question 9

What is the role of ZTNA tags in the FortiSASE Secure Internet Access (SIA) and Secure Private Access (SPA) use cases? (Choose one answer)

Options:

A.

ZTNA tags are created to isolate browser sessions in SIA and enforce data loss prevention in SPA for all devices.

B.

ZTNA tags determine device posture for non-web traffic protocols and are applied only in agentless deployments for SIA.

C.

ZTNA tags determine device posture for endpoints running FortiClient and are used to grant or deny access in SIA or SPA based on that posture.

D.

ZTNA tags are applied to unmanaged endpoints without FortiClient to secure HTTP and HTTPS traffic in SIA and SPA.

Question 10

Which two additional components does FortiSASE use for application control to act as an inline-CASB? (Choose two.)

Options:

A.

intrusion prevention system (IPS)

B.

SSL deep inspection

C.

DNS filter

D.

Web filter with inline-CASB

Question 11

Refer to the exhibit.

Question # 11

A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.

Which configuration must you apply to achieve this requirement?

Options:

A.

Exempt the Google Maps FQDN from the endpoint system proxy settings.

B.

Configure a static route with the Google Maps FQDN on the endpoint to redirect traffic

C.

Configure the Google Maps FQDN as a split tunneling destination on the FortiSASE endpoint profile.

D.

Change the default DNS server configuration on FortiSASE to use the endpoint system DNS.

Question 12

How does FortiSASE address the market trends of multicloud and Software-as-a-Service (SaaS) adoption, hybrid workforce, and zero trust? (Choose one answer)

Options:

A.

It focuses solely on securing on-premises networks, ignoring cloud and remote work challenges.

B.

It prioritizes legacy VPN connections for hybrid workforces, bypassing modern cloud and zero-trust security measures.

C.

It provides visibility and control for multicloud and SaaS environments, ensures secure and seamless access for hybrid workforces, and implements zero-trust principles.1

D.

It supports only zero-trust frameworks without addressing multicloud or hybrid workforce needs.

Question 13

Which FortiSASE feature ensures least-privileged user access to all applications?

Options:

A.

secure web gateway (SWG)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin branch SASE extension

Question 14

A customer wants to upgrade their legacy on-premises proxy to a could-based proxy for a hybrid network. Which FortiSASE features would help the customer to achieve this outcome?

Options:

A.

SD-WAN and NGFW

B.

SD-WAN and inline-CASB

C.

zero trust network access (ZTNA) and next generation firewall (NGFW)

D.

secure web gateway (SWG) and inline-CASB

Question 15

Refer to the exhibits.

Question # 15

Question # 15

When remote users connected to FortiSASE require access to internal resources on Branch-2. how will traffic be routed?

Options:

A.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2. which will then route traffic to Branch-2.

B.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a static route

C.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1, which will then route traffic to Branch-2.

D.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route

Question 16

Which service is included in a secure access service edge (SASE) solution, but not in a security service edge (SSE) solution? (Choose one answer)

Options:

A.

SWG

B.

SD-WAN1

C.

CASB

D.

ZTNA

Question 17

Which two statements about FortiSASE Geofencing with regional compliance are true? (Choose two answers)

Options:

A.

You can configure regional compliance on the security POP or the on-premises device, not both.1

B.

If no regional compliance rule is configured, the connection is made to the closest security POP.

C.

A regional compliance rule can connect only to an on-premises device or only to a security POP.2

D.

The connection order for a regional compliance rule is always the security POP first, followed by the on-premises device.

Question 18

A company must provide access to a web server through FortiSASE secure private access for contractors. What is the recommended method to provide access? (Choose one answer)

Options:

A.

Configure a TCP access proxy forwarding rule and push it to the contractor FortiClient endpoint.

B.

Publish the web server URL on a bookmark portal and share it with contractors.

C.

Update the PAC file with the web server URL and share it with contractors.

D.

Update the DNS records on the endpoint to access private applications.

Question 19

One user has reported connectivity issues; no other users have reported problems. Which tool can the administrator use to identify the problem? (Choose one answer)

Options:

A.

Mobile device management (MDM) service to troubleshoot the connectivity issue.

B.

Digital experience monitoring (DEM) to evaluate the performance metrics of the remote computer.

C.

Forensics service to obtain detailed information about the user's remote computer performance.

D.

SOC-as-a-Service (SOCaaS) to get information about the user's remote computer.

Question 20

Which two advantages does FortiSASE bring to businesses with multiple branch offices? (Choose two.)

Options:

A.

It offers centralized management for simplified administration.

B.

It enables seamless integration with third-party firewalls.

C.

it offers customizable dashboard views for each branch location

D.

It eliminates the need to have an on-premises firewall for each branch.

Question 21

An organization needs to resolve internal hostnames using its internal rather than public DNS servers for remotely connected endpoints. Which two components must be configured on FortiSASE to achieve this? (Choose two.)

Options:

A.

SSL deep inspection

B.

Split DNS rules

C.

Split tunnelling destinations

D.

DNS filter

Question 22

Which authentication method overrides any other previously configured user authentication on FortiSASE?

Options:

A.

Local

B.

SSO

C.

RADIUS

D.

MFA

Question 23

Which two components are part of onboarding a secure web gateway (SWG) endpoint? (Choose two)

Options:

A.

FortiSASE CA certificate

B.

proxy auto-configuration (PAC) file

C.

FortiSASE invitation code

D.

FortiClient installer

Question 24

Refer to the exhibits.

Question # 24

Question # 24

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The tunnel is up to the FortiGale hub. However, the administrator is not able to ping the webserver hosted behind the FortiGate hub.

Based on the output, what is the reason for the ping failures?

Options:

A.

The Secure Private Access (SPA) policy needs to allow PING service.

B.

Quick mode selectors are restricting the subnet.

C.

The BGP route is not received.

D.

Network address translation (NAT) is not enabled on the spoke-to-hub policy.