Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

FCSS_SASE_AD-23 FCSS FortiSASE 23 Administrator Questions and Answers

Questions 4

Refer to the exhibit.

FCSS_SASE_AD-23 Question 4

A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.

Which configuration must you apply to achieve this requirement?

Options:

A.

Exempt the Google Maps FQDN from the endpoint system proxy settings.

B.

Configure a static route with the Google Maps FQDN on the endpoint to redirect traffic

C.

Configure the Google Maps FQDN as a split tunneling destination on the FortiSASE endpoint profile.

D.

Change the default DNS server configuration on FortiSASE to use the endpoint system DNS.

Buy Now
Questions 5

Refer to the exhibit.

FCSS_SASE_AD-23 Question 5

In the user connection monitor, the FortiSASE administrator notices the user name is showing random characters. Which configuration change must the administrator make to get proper user information?

Options:

A.

Turn off log anonymization on FortiSASE.

B.

Add more endpoint licenses on FortiSASE.

C.

Configure the username using FortiSASE naming convention.

D.

Change the deployment type from SWG to VPN.

Buy Now
Questions 6

To complete their day-to-day operations, remote users require access to a TCP-based application that is hosted on a private web server. Which FortiSASE deployment use case provides the most efficient and secure method for meeting the remote users' requirements?

Options:

A.

SD-WAN private access

B.

inline-CASB

C.

zero trust network access (ZTNA) private access

D.

next generation firewall (NGFW)

Buy Now
Questions 7

Which FortiSASE feature ensures least-privileged user access to all applications?

Options:

A.

secure web gateway (SWG)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin branch SASE extension

Buy Now
Questions 8

What are two advantages of using zero-trust tags? (Choose two.)

Options:

A.

Zero-trust tags can be used to allow or deny access to network resources

B.

Zero-trust tags can determine the security posture of an endpoint.

C.

Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints

D.

Zero-trust tags can be used to allow secure web gateway (SWG) access

Buy Now
Questions 9

Refer to the exhibits.

FCSS_SASE_AD-23 Question 9

FCSS_SASE_AD-23 Question 9

FCSS_SASE_AD-23 Question 9

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org. Traffic logs show traffic is allowed by the policy.

Which configuration on FortiSASE is allowing users to perform the download?

Options:

A.

Web filter is allowing the traffic.

B.

IPS is disabled in the security profile group.

C.

The HTTPS protocol is not enabled in the antivirus profile.

D.

Force certificate inspection is enabled in the policy.

Buy Now
Exam Code: FCSS_SASE_AD-23
Exam Name: FCSS FortiSASE 23 Administrator
Last Update: Nov 16, 2024
Questions: 30

PDF + Testing Engine

$64  $159.99

Testing Engine

$48  $119.99
buy now FCSS_SASE_AD-23 testing engine

PDF (Q&A)

$40  $99.99
buy now FCSS_SASE_AD-23 pdf