Fortinet FCSS_SASE_AD-24 Practice Test - Questions Answers, Page 4

List of questions
Question 31

Which two statements describe a zero trust network access (ZTNA) private access use case? (Choose two.)
Question 32

Which statement applies to a single sign-on (SSO) deployment on FortiSASE?
Question 33

Which statement describes the FortiGuard forensics analysis feature on FortiSASE?
Question 34

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.
In this scenario, which three setups will achieve the above requirements? (Choose three.)
Question 35

Which of the following describes the FortiSASE inline-CASB component?
Question 36

An organization must block user attempts to log in to non-company resources while using Microsoft Office 365 to prevent users from accessing unapproved cloud resources.
Which FortiSASE feature can you implement to achieve this requirement?
Question 37

In which three ways does FortiSASE help organizations ensure secure access for remote workers? (Choose three.)
Question 38

Which secure internet access (SIA) use case minimizes individual endpoint configuration?
Question 39

How does FortiSASE hide user information when viewing and analyzing logs?
Question 40

Refer to the exhibit.
A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.
Which configuration must you apply to achieve this requirement?
Question