Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

FCSS_SASE_AD-25 Questions and Answers

Question # 6

When accessing the FortiSASE portal for the first time, an administrator must select data center locations for which three FortiSASE components? (Choose three.)

A.

Identity & access management (IAM)

B.

Points of presence

C.

Endpoint management

D.

Logging

E.

Sandbox

Full Access
Question # 7

In the Secure Private Access (SPA) use case, which two FortiSASE features facilitate access to corporate applications? (Choose two.)

A.

cloud access security broker (CASB)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin edge

Full Access
Question # 8

Your FortiSASE customer has a small branch office in which ten users will be using their personal laptops and mobile devices to access the internet.

Which deployment should they use to secure their internet access with minimal configuration?

A.

Deploy FortiGate as a LAN extension to secure internet access.

B.

Deploy FortiAP to secure internet access.

C.

Deploy FortiClient endpoint agent to secure internet access.

D.

Deploy SD-WAN on-ramp to secure internet access.

Full Access
Question # 9

Refer to the exhibit.

An organization must inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical interface.

Which configuration must you apply to achieve this requirement?

A.

Configure a steering bypass tunnel firewall policy using Google Maps FQDN to exclude and redirect the traffic.

B.

Add the Google Maps URL in the zero trust network access (ZTNA) TCP access proxy forwarding rule.

C.

Add the Google Maps URL as a steering bypass destination in the endpoint profile.

D.

Exempt Google Maps in URL filtering in the web filter profile.

Full Access
Question # 10

Which two additional features does FortiClient integration provide with FortiSASE, when compared to secure web gateway (SWG) deployment? (Choose two.)

A.

vulnerability management

B.

device posture check

C.

inline-CASB protection

D.

SSL inspection

Full Access
Question # 11

Which statement applies to a single sign-on (SSO) deployment on FortiSASE?

A.

SSO users can be imported into FortiSASE and added to user groups.

B.

SSO is recommended only for agent-based deployments.

C.

SSO overrides any other previously configured user authentication.

D.

SSO identity providers can be integrated using public and private access types.

Full Access
Question # 12

Which authentication method overrides any other previously configured user authentication on FortiSASE?

A.

MFA

B.

Local

C.

RADIUS

D.

SSO

Full Access
Question # 13

Refer to the exhibit.

While reviewing the traffic logs, the FortiSASE administrator notices that the usernames are showing random characters.

Why are the usernames showing random characters?

A.

Log anonymization is turned on to hash usernames.

B.

Special characters are used in usernames.

C.

Users are using a shared single sign-on SSO username.

D.

FortiSASE uses FortiClient unique identifiers for usernames.

Full Access
Question # 14

Which information does FortiSASE use to bring network lockdown into effect on an endpoint?

A.

Zero-day malware detection on endpoint

B.

The number of critical vulnerabilities detected on the endpoint

C.

The security posture of the endpoint based on ZTNA tags

D.

The connection status of the tunnel to FortiSASE

Full Access
Question # 15

A company must provide access to a web server through FortiSASE secure private access for contractors.

What is the recommended method to provide access?

A.

Configure a TCP access proxy forwarding rule and push it to the contractor FortiClient endpoint.

B.

Update the DNS records on the endpoint to access private applications.

C.

Publish the web server URL on a bookmark portal and share it with contractors.

D.

Update the PAC file with the web server URL and share it with contractors.

Full Access