Weekend Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Certified Solution Specialist > FCSS_SASE_AD-24

FCSS_SASE_AD-24 FCSS - FortiSASE 24 Administrator Question and Answers

Question # 4

An organization wants to block all video and audio application traffic but grant access to videos from CNN Which application override action must you configure in the Application Control with Inline-CASB?

A.

Allow

B.

Pass

C.

Permit

D.

Exempt

Full Access
Question # 5

Which two components are part of onboarding a secure web gateway (SWG) endpoint? (Choose two)

A.

FortiSASE CA certificate

B.

proxy auto-configuration (PAC) file

C.

FortiSASE invitation code

D.

FortiClient installer

Full Access
Question # 6

To complete their day-to-day operations, remote users require access to a TCP-based application that is hosted on a private web server. Which FortiSASE deployment use case provides the most efficient and secure method for meeting the remote users' requirements?

A.

SD-WAN private access

B.

inline-CASB

C.

zero trust network access (ZTNA) private access

D.

next generation firewall (NGFW)

Full Access
Question # 7

Refer to the exhibits.

When remote users connected to FortiSASE require access to internal resources on Branch-2. how will traffic be routed?

A.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2. which will then route traffic to Branch-2.

B.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a static route

C.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1, which will then route traffic to Branch-2.

D.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route

Full Access
Question # 8

Which FortiSASE feature ensures least-privileged user access to all applications?

A.

secure web gateway (SWG)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin branch SASE extension

Full Access
Question # 9

When viewing the daily summary report generated by FortiSASE, the administrator notices that the report contains very little data.

What is a possible explanation for this almost empty report?

A.

Log allowed traffic is set to Security Events for all policies.

B.

There are no security profile groups applied to all policies.

C.

The web filter security profile is not set to Monitor.

D.

Digital experience monitoring is not configured.

Full Access
Question # 10

Refer to the exhibit.

The daily report for application usage shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

A.

Certificate inspection is not being used to scan application traffic.

B.

The inline-CASB application control profile does not have application categories set to Monitor

C.

Zero trust network access (ZTNA) tags are not being used to tag the correct users.

D.

Deep inspection is not being used to scan traffic.

Full Access
Question # 11

Which role does FortiSASE play in supporting zero trust network access (ZTNA) principles9

A.

It offers hardware-based firewalls for network segmentation.

B.

It integrates with software-defined network (SDN) solutions.

C.

It can identify attributes on the endpoint for security posture check.

D.

It enables VPN connections for remote employees.

Full Access
Question # 12

Which secure internet access (SIA) use case minimizes individual workstation or device setup, because you do not need to install FortiClient on endpoints or configure explicit web proxy settings on web browser-based end points?

A.

SIA for inline-CASB users

B.

SIA for agentless remote users

C.

SIA for SSLVPN remote users

D.

SIA for site-based remote users

Full Access