Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

FCSS_SASE_AD-25 Questions and Answers

Question # 6

What is the recommended method to upgrade FortiClient in a FortiSASE deployment?

A.

Remote users must upgrade the FortiClient manually.

B.

FortiSASE automatically upgrades FortiClient when a new version is released.

C.

The FortiSASE administrator must assign endpoint groups to an endpoint upgrade rule.

D.

The FortiSASE administrator will upload the desired FortiClient version to the FortiSASE portal and push it to endpoints.

Full Access
Question # 7

Refer to the exhibit.

While reviewing the traffic logs, the FortiSASE administrator notices that the usernames are showing random characters.

Why are the usernames showing random characters?

A.

Log anonymization is turned on to hash usernames.

B.

Special characters are used in usernames.

C.

Users are using a shared single sign-on SSO username.

D.

FortiSASE uses FortiClient unique identifiers for usernames.

Full Access
Question # 8

An administrator must restrict endpoints from certain countries from connecting to FortiSASE.

Which configuration can achieve this?

A.

Configure a network lockdown policy on the endpoint profiles.

B.

Configure a geography address object as the source for a deny policy.

C.

Configure geofencing to restrict access from the required countries.

D.

Configure source IP anchoring to restrict access from the specified countries.

Full Access
Question # 9

Refer to the exhibits.

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org.

Which configuration on FortiSASE is allowing users to perform the download?

A.

Web filter is allowing the URL.

B.

Deep inspection is not enabled.

C.

Application control is exempting all the browser traffic.

D.

Intrusion prevention is disabled.

Full Access
Question # 10

Which information does FortiSASE use to bring network lockdown into effect on an endpoint?

A.

Zero-day malware detection on endpoint

B.

The number of critical vulnerabilities detected on the endpoint

C.

The security posture of the endpoint based on ZTNA tags

D.

The connection status of the tunnel to FortiSASE

Full Access
Question # 11

What happens to the logs on FortiSASE that are older than the configured log retention period?

A.

The logs are deleted from FortiSASE.

B.

The logs are indexed and can be stored in a SQL database.

C.

The logs are backed up on FortiCloud.

D.

The logs are compressed and archived.

Full Access
Question # 12

Your FortiSASE customer has a small branch office in which ten users will be using their personal laptops and mobile devices to access the internet.

Which deployment should they use to secure their internet access with minimal configuration?

A.

Deploy FortiGate as a LAN extension to secure internet access.

B.

Deploy FortiAP to secure internet access.

C.

Deploy FortiClient endpoint agent to secure internet access.

D.

Deploy SD-WAN on-ramp to secure internet access.

Full Access
Question # 13

Refer to the exhibit.

The daily report for application usage for internet traffic shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

A.

Certificate inspection is not being used to scan application traffic.

B.

Deep inspection is not being used to scan traffic.

C.

The private access policy must be to set to log Security Events.

D.

The inline-CASB application control profile does not have application categories set to Monitor.

Full Access
Question # 14

Which authentication method overrides any other previously configured user authentication on FortiSASE?

A.

MFA

B.

Local

C.

RADIUS

D.

SSO

Full Access
Question # 15

What are two benefits of deploying secure private access with SD-WAN? (Choose two.)

A.

a direct access proxy tunnel from FortiClient to the on-premises FortiGate

B.

ZTNA posture check performed by the hub FortiGate

C.

support of both TCP and UDP applications

D.

inline security inspection by FortiSASE

Full Access