FCSS - FortiSASE 24 Administrator Questions and Answers
When deploying FortiSASE agent-based clients, which three features are available compared to an agentless solution? (Choose three.)
How does FortiSASE hide user information when viewing and analyzing logs?
When accessing the FortiSASE portal for the first time, an administrator must select data center locations for which three FortiSASE components? (Choose three.)
Which two additional components does FortiSASE use for application control to act as an inline-CASB? (Choose two.)
An organization needs to resolve internal hostnames using its internal rather than public DNS servers for remotely connected endpoints. Which two components must be configured on FortiSASE to achieve this? (Choose two.)
Which statement describes the FortiGuard forensics analysis feature on FortiSASE?
Refer to the exhibit.
The daily report for application usage shows an unusually high number of unknown applications by category.
What are two possible explanations for this? (Choose two.)
Which role does FortiSASE play in supporting zero trust network access (ZTNA) principles9
What are two advantages of using zero-trust tags? (Choose two.)
Refer to the exhibit.
A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.
Which configuration must you apply to achieve this requirement?
Refer to the exhibit.
To allow access, which web tiller configuration must you change on FortiSASE?
Which secure internet access (SIA) use case minimizes individual endpoint configuration?