Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Fortinet Certified Solution Specialist FCSS_SASE_AD-25 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam FCSS_SASE_AD-25 Premium Access

View all detail and faqs for the FCSS_SASE_AD-25 exam


552 Students Passed

93% Average Score

93% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

In a FortiSASE secure web gateway (SWG) deployment, which two features protect against web-based threats? (Choose two.)

Options:

A.

SSL deep inspection for encrypted web traffic

B.

malware protection with sandboxing capabilities

C.

web application firewall (WAF) for web applications

D.

intrusion prevention system (IPS) for web traffic

Questions # 2:

Refer to the exhibit.

Question # 2

An organization must inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical interface.

Which configuration must you apply to achieve this requirement?

Options:

A.

Configure a steering bypass tunnel firewall policy using Google Maps FQDN to exclude and redirect the traffic.

B.

Add the Google Maps URL in the zero trust network access (ZTNA) TCP access proxy forwarding rule.

C.

Add the Google Maps URL as a steering bypass destination in the endpoint profile.

D.

Exempt Google Maps in URL filtering in the web filter profile.

Questions # 3:

Refer to the exhibits.

Question # 3

Question # 3

Antivirus is installed on a Windows 10 endpoint, but the windows application firewall is stopping it from running.

What will the endpoint security posture check be?

Options:

A.

FortiClient will tag the endpoint as FortiSASE-Non-Compliant.

B.

FortiClient will be unmanaged from FortiSASE due to failed compliance.

C.

FortiClient will trigger network lockdown on the endpoint.

D.

FortiClient will prompt the user to enable antivirus.

Questions # 4:

Which statement best describes the Digital Experience Monitor (DEM) feature on FortiSASE?

Options:

A.

It provides end-to-end network visibility from all the FortiSASE security PoPs to a specific SaaS application.

B.

It gathers all the vulnerability information from all the FortiClient endpoints.

C.

It is used for performing device compliance checks on endpoints.

D.

It monitors the FortiSASE POP health based on ping probes.

Questions # 5:

Which two settings are automatically pushed from FortiSASE to FortiClient in a new FortiSASE deployment with default settings? (Choose two.)

Options:

A.

zero trust network access (ZTNA) tags

B.

tunnel profile

C.

FortiSASE certificate authority (CA) certificate

D.

real-time protection

Questions # 6:

Which two components are part of onboarding a secure web gateway (SWG) endpoint for secure internet access (SIA)? (Choose two.)

Options:

A.

proxy auto-configuration (PAC) file

B.

FortiSASE certificate authority (CA) certificate

C.

FortiClient software

D.

tunnel policy

Questions # 7:

Which FortiSASE component protects users from online threats by hosting their browsing sessions on a remote container within a secure environment?

Options:

A.

secure web gateway (SWG)

B.

remote browser isolation (RBI)

C.

cloud access security broker (CASB)

D.

data loss prevention (DLP)

Questions # 8:

How do security profile group objects behave when central management is enabled on FortiSASE?

Options:

A.

Objects support two-way synchronization.

B.

Objects created on FortiSASE can be retrieved on FortiManager.

C.

Objects that are only flow-based are supported.

D.

Objects are considered read-only on FortiSASE.

Questions # 9:

Refer to the exhibit.

Question # 9

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.

In this scenario, which two setups will achieve these requirements? (Choose two.)

Options:

A.

Configure ZTNA servers and ZTNA policies on FortiGate.

B.

Configure FortiGate as a zero trust network access (ZTNA) access proxy.

C.

Configure ZTNA tags on FortiGate.

D.

Configure private access policies on FortiSASE with ZTNA.

Questions # 10:

Refer to the exhibit.

Question # 10

The daily report for application usage for internet traffic shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

Options:

A.

Certificate inspection is not being used to scan application traffic.

B.

Deep inspection is not being used to scan traffic.

C.

The private access policy must be to set to log Security Events.

D.

The inline-CASB application control profile does not have application categories set to Monitor.

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.