Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Fortinet FCSS_SASE_AD-24 FCSS - FortiSASE 24 Administrator Exam Practice Test

FCSS - FortiSASE 24 Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which statement applies to a single sign-on (SSO) deployment on FortiSASE?

Options:

A.

SSO overrides any other previously configured user authentication.

B.

SSO identity providers can be integrated using public and private access types.

C.

SSO is recommended only for agent-based deployments.

D.

SSO users can be imported into FortiSASE and added to user groups.

Question 2

Which event log subtype captures FortiSASE SSL VPN user creation?

Options:

A.

Endpoint Events

B.

VPN Events

C.

User Events

D.

Administrator Events

Question 3

Which secure internet access (SIA) use case minimizes individual workstation or device setup, because you do not need to install FortiClient on endpoints or configure explicit web proxy settings on web browser-based end points?

Options:

A.

SIA for inline-CASB users

B.

SIA for agentless remote users

C.

SIA for SSLVPN remote users

D.

SIA for site-based remote users

Question 4

During FortiSASE provisioning, how many security points of presence (POPs) need to be configured by the FortiSASE administrator?

Options:

A.

3

B.

4

C.

2

D.

1

Question 5

You are designing a new network for Company X and one of the new cybersecurity policy requirements is that all remote user endpoints must always be connected and protected Which FortiSASE component facilitates this always-on security measure?

Options:

A.

site-based deployment

B.

thin-branch SASE extension

C.

unified FortiClient

D.

inline-CASB

Question 6

Which FortiSASE feature ensures least-privileged user access to all applications?

Options:

A.

secure web gateway (SWG)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin branch SASE extension

Question 7

Refer to the exhibits.

Antivirus is installed on a Windows 10 endpoint, but the windows application firewall is stopping it from running.

What will the endpoint security posture check be?

Options:

A.

FortiClient will block the endpoint from getting access to the network.

B.

FortiClient telemetry will be disconnected because of failed compliance.

C.

FortiClient will tag the endpoint as FortiSASE-Non-Compliant.

D.

FortiClient will prompt the user to enable antivirus.

Question 8

What are two advantages of using zero-trust tags? (Choose two.)

Options:

A.

Zero-trust tags can be used to allow or deny access to network resources

B.

Zero-trust tags can determine the security posture of an endpoint.

C.

Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints

D.

Zero-trust tags can be used to allow secure web gateway (SWG) access

Question 9

When you configure FortiSASE Secure Private Access (SPA) with SD-WAN integration, you must establish a routing adjacency between FortiSASE and the FortiGate SD-WAN hub. Which routing protocol must you use?

Options:

A.

BGP

B.

IS-IS

C.

OSPF

D.

EIGRP

Question 10

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.

In this scenario, which three setups will achieve the above requirements? (Choose three.)

Options:

A.

Configure ZTNA servers and ZTNA policies on FortiGate.

B.

Configure private access policies on FortiSASE with ZTNA.

C.

Configure ZTNA tags on FortiGate.

D.

Configure FortiGate as a zero trust network access (ZTNA) access proxy.

E.

Sync ZTNA tags from FortiSASE to FortiGate.

Question 11

How does FortiSASE hide user information when viewing and analyzing logs?

Options:

A.

By hashing data using Blowfish

B.

By hashing data using salt

C.

By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)

D.

By encrypting data using advanced encryption standard (AES)

Question 12

Refer to the exhibit.

In the user connection monitor, the FortiSASE administrator notices the user name is showing random characters. Which configuration change must the administrator make to get proper user information?

Options:

A.

Turn off log anonymization on FortiSASE.

B.

Add more endpoint licenses on FortiSASE.

C.

Configure the username using FortiSASE naming convention.

D.

Change the deployment type from SWG to VPN.

Question 13

Refer to the exhibit.

The daily report for application usage shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

Options:

A.

Certificate inspection is not being used to scan application traffic.

B.

The inline-CASB application control profile does not have application categories set to Monitor

C.

Zero trust network access (ZTNA) tags are not being used to tag the correct users.

D.

Deep inspection is not being used to scan traffic.