Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Fortinet FCSS_SASE_AD-24 Dumps

FCSS - FortiSASE 24 Administrator Questions and Answers

Question 1

When deploying FortiSASE agent-based clients, which three features are available compared to an agentless solution? (Choose three.)

Options:

A.

Vulnerability scan

B.

SSL inspection

C.

Anti-ransomware protection

D.

Web filter

E.

ZTNA tags

Question 2

How does FortiSASE hide user information when viewing and analyzing logs?

Options:

A.

By hashing data using Blowfish

B.

By hashing data using salt

C.

By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)

D.

By encrypting data using advanced encryption standard (AES)

Question 3

When accessing the FortiSASE portal for the first time, an administrator must select data center locations for which three FortiSASE components? (Choose three.)

Options:

A.

Endpoint management

B.

Points of presence

C.

SD-WAN hub

D.

Logging

E.

Authentication

Question 4

Which two additional components does FortiSASE use for application control to act as an inline-CASB? (Choose two.)

Options:

A.

intrusion prevention system (IPS)

B.

SSL deep inspection

C.

DNS filter

D.

Web filter with inline-CASB

Question 5

An organization needs to resolve internal hostnames using its internal rather than public DNS servers for remotely connected endpoints. Which two components must be configured on FortiSASE to achieve this? (Choose two.)

Options:

A.

SSL deep inspection

B.

Split DNS rules

C.

Split tunnelling destinations

D.

DNS filter

Question 6

Which statement describes the FortiGuard forensics analysis feature on FortiSASE?

Options:

A.

It can help troubleshoot user-to-application performance issues.

B.

It can help customers identify and mitigate potential risks to their network.

C.

It can monitor endpoint resources in real-time.

D.

It is a 24x7x365 monitoring service of your FortiSASE environment.

Question 7

Refer to the exhibit.

as

The daily report for application usage shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

Options:

A.

Certificate inspection is not being used to scan application traffic.

B.

The inline-CASB application control profile does not have application categories set to Monitor

C.

Zero trust network access (ZTNA) tags are not being used to tag the correct users.

D.

Deep inspection is not being used to scan traffic.

Question 8

Which role does FortiSASE play in supporting zero trust network access (ZTNA) principles9

Options:

A.

It offers hardware-based firewalls for network segmentation.

B.

It integrates with software-defined network (SDN) solutions.

C.

It can identify attributes on the endpoint for security posture check.

D.

It enables VPN connections for remote employees.

Question 9

What are two advantages of using zero-trust tags? (Choose two.)

Options:

A.

Zero-trust tags can be used to allow or deny access to network resources

B.

Zero-trust tags can determine the security posture of an endpoint.

C.

Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints

D.

Zero-trust tags can be used to allow secure web gateway (SWG) access

Question 10

Refer to the exhibit.

as

A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.

Which configuration must you apply to achieve this requirement?

Options:

A.

Exempt the Google Maps FQDN from the endpoint system proxy settings.

B.

Configure a static route with the Google Maps FQDN on the endpoint to redirect traffic

C.

Configure the Google Maps FQDN as a split tunneling destination on the FortiSASE endpoint profile.

D.

Change the default DNS server configuration on FortiSASE to use the endpoint system DNS.

Question 11

Refer to the exhibit.

as

To allow access, which web tiller configuration must you change on FortiSASE?

Options:

A.

FortiGuard category-based filter

B.

content filter

C.

URL Filter

D.

inline cloud access security broker (CASB) headers

Question 12

Which secure internet access (SIA) use case minimizes individual endpoint configuration?

Options:

A.

Site-based remote user internet access

B.

Agentless remote user internet access

C.

SIA for SSL VPN remote users

D.

SIA using ZTNA

Page: 1 / 4
Total 43 questions