Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Fortinet FCSS_SASE_AD-23 Dumps

FCSS FortiSASE 23 Administrator Questions and Answers

Question 1

What are two advantages of using zero-trust tags? (Choose two.)

Options:

A.

Zero-trust tags can be used to allow or deny access to network resources

B.

Zero-trust tags can determine the security posture of an endpoint.

C.

Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints

D.

Zero-trust tags can be used to allow secure web gateway (SWG) access

Question 2

Refer to the exhibits.

as

as

When remote users connected to FortiSASE require access to internal resources on Branch-2. how will traffic be routed?

Options:

A.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2. which will then route traffic to Branch-2.

B.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a static route

C.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1, which will then route traffic to Branch-2.

D.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route

Question 3

Refer to the exhibits.

as

as

as

as

as

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The tunnel is up to the FortiGale hub. However, the administrator is not able to ping the webserver hosted behind the FortiGate hub.

Based on the output, what is the reason for the ping failures?

Options:

A.

The Secure Private Access (SPA) policy needs to allow PING service.

B.

Quick mode selectors are restricting the subnet.

C.

The BGP route is not received.

D.

Network address translation (NAT) is not enabled on the spoke-to-hub policy.

Question 4

Which FortiSASE feature ensures least-privileged user access to all applications?

Options:

A.

secure web gateway (SWG)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin branch SASE extension

Question 5

A customer wants to upgrade their legacy on-premises proxy to a could-based proxy for a hybrid network. Which FortiSASE features would help the customer to achieve this outcome?

Options:

A.

SD-WAN and NGFW

B.

SD-WAN and inline-CASB

C.

zero trust network access (ZTNA) and next generation firewall (NGFW)

D.

secure web gateway (SWG) and inline-CASB

Question 6

Refer to the exhibits.

as

as

as

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from Traffic logs show traffic is allowed by the policy.

Which configuration on FortiSASE is allowing users to perform the download?

Options:

A.

Web filter is allowing the traffic.

B.

IPS is disabled in the security profile group.

C.

The HTTPS protocol is not enabled in the antivirus profile.

D.

Force certificate inspection is enabled in the policy.

Question 7

Which two additional components does FortiSASE use for application control to act as an inline-CASB? (Choose two.)

Options:

A.

intrusion prevention system (IPS)

B.

SSL deep inspection

C.

DNS filter

D.

Web filter with inline-CASB

Question 8

Which policy type is used to control traffic between the FortiClient endpoint to FortiSASE for secure internet access?

Options:

A.

VPN policy

B.

thin edge policy

C.

private access policy

D.

secure web gateway (SWG) policy

Question 9

How does FortiSASE hide user information when viewing and analyzing logs?

Options:

A.

By hashing data using Blowfish

B.

By hashing data using salt

C.

By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)

D.

By encrypting data using advanced encryption standard (AES)

Page: 1 / 3
Total 30 questions