Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Fortinet FCSS_SASE_AD-24 FCSS - FortiSASE 24 Administrator Exam Practice Test

FCSS - FortiSASE 24 Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

You are designing a new network for Company X and one of the new cybersecurity policy requirements is that all remote user endpoints must always be connected and protected Which FortiSASE component facilitates this always-on security measure?

Options:

A.

site-based deployment

B.

thin-branch SASE extension

C.

unified FortiClient

D.

inline-CASB

Question 2

Which of the following describes the FortiSASE inline-CASB component?

Options:

A.

It provides visibility for unmanaged locations and devices.

B.

It is placed directly in the traffic path between the endpoint and cloud applications.

C.

It uses API to connect to the cloud applications.

D.

It detects data at rest.

Question 3

What are two requirements to enable the MSSP feature on FortiSASE? (Choose two.)

Options:

A.

Add FortiCloud premium subscription on the root FortiCloud account.

B.

Configure MSSP user accounts and permissions on the FortiSASE portal.

C.

Assign role-based access control (RBAC) to IAM users using FortiCloud IAM portal.

D.

Enable multi-tenancy on the FortiSASE portal.

Question 4

What are two advantages of using zero-trust tags? (Choose two.)

Options:

A.

Zero-trust tags can be used to allow or deny access to network resources

B.

Zero-trust tags can determine the security posture of an endpoint.

C.

Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints

D.

Zero-trust tags can be used to allow secure web gateway (SWG) access

Question 5

When you configure FortiSASE Secure Private Access (SPA) with SD-WAN integration, you must establish a routing adjacency between FortiSASE and the FortiGate SD-WAN hub. Which routing protocol must you use?

Options:

A.

BGP

B.

IS-IS

C.

OSPF

D.

EIGRP

Question 6

Which secure internet access (SIA) use case minimizes individual endpoint configuration?

Options:

A.

Site-based remote user internet access

B.

Agentless remote user internet access

C.

SIA for SSL VPN remote users

D.

SIA using ZTNA

Question 7

Which two statements describe a zero trust network access (ZTNA) private access use case? (Choose two.)

Options:

A.

The security posture of the device is secure.

B.

All FortiSASE user-based deployments are supported.

C.

All TCP-based applications are supported.

D.

Data center redundancy is offered.

Question 8

When deploying FortiSASE agent-based clients, which three features are available compared to an agentless solution? (Choose three.)

Options:

A.

Vulnerability scan

B.

SSL inspection

C.

Anti-ransomware protection

D.

Web filter

E.

ZTNA tags

Question 9

To complete their day-to-day operations, remote users require access to a TCP-based application that is hosted on a private web server. Which FortiSASE deployment use case provides the most efficient and secure method for meeting the remote users' requirements?

Options:

A.

SD-WAN private access

B.

inline-CASB

C.

zero trust network access (ZTNA) private access

D.

next generation firewall (NGFW)

Question 10

Refer to the exhibit.

A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.

Which configuration must you apply to achieve this requirement?

Options:

A.

Exempt the Google Maps FQDN from the endpoint system proxy settings.

B.

Configure a static route with the Google Maps FQDN on the endpoint to redirect traffic

C.

Configure the Google Maps FQDN as a split tunneling destination on the FortiSASE endpoint profile.

D.

Change the default DNS server configuration on FortiSASE to use the endpoint system DNS.

Question 11

How does FortiSASE hide user information when viewing and analyzing logs?

Options:

A.

By hashing data using Blowfish

B.

By hashing data using salt

C.

By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)

D.

By encrypting data using advanced encryption standard (AES)

Question 12

An organization needs to resolve internal hostnames using its internal rather than public DNS servers for remotely connected endpoints. Which two components must be configured on FortiSASE to achieve this? (Choose two.)

Options:

A.

SSL deep inspection

B.

Split DNS rules

C.

Split tunnelling destinations

D.

DNS filter