ExamGecko
Home Home / Fortinet / FCSS_SASE_AD-23

Fortinet FCSS_SASE_AD-23 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











What are two advantages of using zero-trust tags? (Choose two.)

A.
Zero-trust tags can be used to allow or deny access to network resources
A.
Zero-trust tags can be used to allow or deny access to network resources
Answers
B.
Zero-trust tags can determine the security posture of an endpoint.
B.
Zero-trust tags can determine the security posture of an endpoint.
Answers
C.
Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints
C.
Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints
Answers
D.
Zero-trust tags can be used to allow secure web gateway (SWG) access
D.
Zero-trust tags can be used to allow secure web gateway (SWG) access
Answers
Suggested answer: A, B

Explanation:

Zero-trust tags are critical in implementing zero-trust network access (ZTNA) policies. Here are the two key advantages of using zero-trust tags:

Access Control (Allow or Deny):

Zero-trust tags can be used to define policies that either allow or deny access to specific network resources based on the tag associated with the user or device.

This granular control ensures that only authorized users or devices with the appropriate tags can access sensitive resources, thereby enhancing security.

Determining Security Posture:

Zero-trust tags can be utilized to assess and determine the security posture of an endpoint.

Based on the assigned tags, FortiSASE can evaluate the device's compliance with security policies, such as antivirus status, patch levels, and configuration settings.

Devices that do not meet the required security posture can be restricted from accessing the network or given limited access.

FortiOS 7.2 Administration Guide: Provides detailed information on configuring and using zero-trust tags for access control and security posture assessment.

FortiSASE 23.2 Documentation: Explains how zero-trust tags are implemented and used within the FortiSASE environment for enhancing security and compliance.

Refer to the exhibit.

In the user connection monitor, the FortiSASE administrator notices the user name is showing random characters. Which configuration change must the administrator make to get proper user information?

A.
Turn off log anonymization on FortiSASE.
A.
Turn off log anonymization on FortiSASE.
Answers
B.
Add more endpoint licenses on FortiSASE.
B.
Add more endpoint licenses on FortiSASE.
Answers
C.
Configure the username using FortiSASE naming convention.
C.
Configure the username using FortiSASE naming convention.
Answers
D.
Change the deployment type from SWG to VPN.
D.
Change the deployment type from SWG to VPN.
Answers
Suggested answer: A

Explanation:

In the user connection monitor, the random characters shown for the username indicate that log anonymization is enabled. Log anonymization is a feature that hides the actual user information in the logs for privacy and security reasons. To display proper user information, you need to disable log anonymization.

Log Anonymization:

When log anonymization is turned on, the actual usernames are replaced with random characters to protect user privacy.

This feature can be beneficial in certain environments but can cause issues when detailed user monitoring is required.

Disabling Log Anonymization:

Navigate to the FortiSASE settings.

Locate the log settings section.

Disable the log anonymization feature to ensure that actual usernames are displayed in the logs and user connection monitors.

FortiSASE 23.2 Documentation: Provides detailed steps on enabling and disabling log anonymization.

Fortinet Knowledge Base: Explains the impact of log anonymization on user monitoring and logging.

Refer to the exhibit.

To allow access, which web tiller configuration must you change on FortiSASE?

A.
FortiGuard category-based filter
A.
FortiGuard category-based filter
Answers
B.
content filter
B.
content filter
Answers
C.
URL Filter
C.
URL Filter
Answers
D.
inline cloud access security broker (CASB) headers
D.
inline cloud access security broker (CASB) headers
Answers
Suggested answer: C

Explanation:

The exhibit indicates that the URL https://www.bbc.com/ is being blocked due to containing a banned word ('fight'). To allow access to this specific URL, you need to adjust the URL filter settings on FortiSASE.

URL Filtering:

URL filtering allows administrators to define policies that block or allow access to specific URLs or URL patterns.

In this case, the URL filter is set to block any URL containing the word 'fight.'

Modifying URL Filter:

Navigate to the Web Filter configuration in FortiSASE.

Locate the URL filter settings.

Add an exception for the URL https://www.bbc.com/ to allow access, even if it contains a banned word.

Alternatively, remove or adjust the banned word list to exclude the word 'fight' if it's not critical to the security policy.

FortiOS 7.2 Administration Guide: Provides details on configuring and managing URL filters.

FortiSASE 23.2 Documentation: Explains how to set up and modify web filtering policies, including URL filters.

Which policy type is used to control traffic between the FortiClient endpoint to FortiSASE for secure internet access?

A.
VPN policy
A.
VPN policy
Answers
B.
thin edge policy
B.
thin edge policy
Answers
C.
private access policy
C.
private access policy
Answers
D.
secure web gateway (SWG) policy
D.
secure web gateway (SWG) policy
Answers
Suggested answer: D

Explanation:

The Secure Web Gateway (SWG) policy is used to control traffic between the FortiClient endpoint and FortiSASE for secure internet access. SWG provides comprehensive web security by enforcing policies that manage and monitor user access to the internet.

Secure Web Gateway (SWG) Policy:

SWG policies are designed to protect users from web-based threats and enforce acceptable use policies.

These policies control and monitor user traffic to and from the internet, ensuring that security protocols are followed.

Traffic Control:

The SWG policy intercepts all web traffic, inspects it, and applies security rules before allowing or blocking access.

This policy type is crucial for providing secure internet access to users connecting through FortiSASE.

FortiOS 7.2 Administration Guide: Details on configuring and managing SWG policies.

FortiSASE 23.2 Documentation: Explains the role of SWG in securing internet access for endpoints.

Refer to the exhibits.

WiMO-Pro and Win7-Pro are endpoints from the same remote location. WiMO-Pro can access the internet though FortiSASE, while Wm7-Pro can no longer access the internet

Given the exhibits, which reason explains the outage on Wm7-Pro?

A.
The Win7-Pro device posture has changed.
A.
The Win7-Pro device posture has changed.
Answers
B.
Win7-Pro cannot reach the FortiSASE SSL VPN gateway
B.
Win7-Pro cannot reach the FortiSASE SSL VPN gateway
Answers
C.
The Win7-Pro FortiClient version does not match the FortiSASE endpoint requirement.
C.
The Win7-Pro FortiClient version does not match the FortiSASE endpoint requirement.
Answers
D.
Win-7 Pro has exceeded the total vulnerability detected threshold.
D.
Win-7 Pro has exceeded the total vulnerability detected threshold.
Answers
Suggested answer: D

Explanation:

Based on the provided exhibits, the reason why the Win7-Pro endpoint can no longer access the internet through FortiSASE is due to exceeding the total vulnerability detected threshold. This threshold is used to determine if a device is compliant with the security requirements to access the network.

Endpoint Compliance:

FortiSASE monitors endpoint compliance by assessing various security parameters, including the number of vulnerabilities detected on the device.

The compliance status is indicated by the ZTNA tags and the vulnerabilities detected.

Vulnerability Threshold:

The exhibit shows that Win7-Pro has 176 vulnerabilities detected, whereas Win10-Pro has 140 vulnerabilities.

If the endpoint exceeds a predefined vulnerability threshold, it may be restricted from accessing the network to ensure overall network security.

Impact on Network Access:

Since Win7-Pro has exceeded the vulnerability threshold, it is marked as non-compliant and subsequently loses internet access through FortiSASE.

The FortiSASE endpoint profile enforces this compliance check to prevent potentially vulnerable devices from accessing the internet.

FortiOS 7.2 Administration Guide: Provides information on endpoint compliance and vulnerability management.

FortiSASE 23.2 Documentation: Explains how vulnerability thresholds are used to determine endpoint compliance and access control.

A customer wants to upgrade their legacy on-premises proxy to a could-based proxy for a hybrid network. Which FortiSASE features would help the customer to achieve this outcome?

A.
SD-WAN and NGFW
A.
SD-WAN and NGFW
Answers
B.
SD-WAN and inline-CASB
B.
SD-WAN and inline-CASB
Answers
C.
zero trust network access (ZTNA) and next generation firewall (NGFW)
C.
zero trust network access (ZTNA) and next generation firewall (NGFW)
Answers
D.
secure web gateway (SWG) and inline-CASB
D.
secure web gateway (SWG) and inline-CASB
Answers
Suggested answer: D

Explanation:

For a customer looking to upgrade their legacy on-premises proxy to a cloud-based proxy for a hybrid network, the combination of Secure Web Gateway (SWG) and Inline Cloud Access Security Broker (CASB) features in FortiSASE will provide the necessary capabilities.

Secure Web Gateway (SWG):

SWG provides comprehensive web security by inspecting and filtering web traffic to protect against web-based threats.

It ensures that all web traffic, whether originating from on-premises or remote locations, is inspected and secured by the cloud-based proxy.

Inline Cloud Access Security Broker (CASB):

CASB enhances security by providing visibility and control over cloud applications and services.

Inline CASB integrates with SWG to enforce security policies for cloud application usage, preventing unauthorized access and data leakage.

FortiOS 7.2 Administration Guide: Details on SWG and CASB features.

FortiSASE 23.2 Documentation: Explains how SWG and inline-CASB are used in cloud-based proxy solutions.

When you configure FortiSASE Secure Private Access (SPA) with SD-WAN integration, you must establish a routing adjacency between FortiSASE and the FortiGate SD-WAN hub. Which routing protocol must you use?

A.
BGP
A.
BGP
Answers
B.
IS-IS
B.
IS-IS
Answers
C.
OSPF
C.
OSPF
Answers
D.
EIGRP
D.
EIGRP
Answers
Suggested answer: A

Explanation:

When configuring FortiSASE Secure Private Access (SPA) with SD-WAN integration, establishing a routing adjacency between FortiSASE and the FortiGate SD-WAN hub requires the use of the Border Gateway Protocol (BGP).

BGP (Border Gateway Protocol):

BGP is widely used for establishing routing adjacencies between different networks, particularly in SD-WAN environments.

It provides scalability and flexibility in managing dynamic routing between FortiSASE and the FortiGate SD-WAN hub.

Routing Adjacency:

BGP enables the exchange of routing information between FortiSASE and the FortiGate SD-WAN hub.

This ensures optimal routing paths and efficient traffic management across the hybrid network.

FortiOS 7.2 Administration Guide: Provides information on configuring BGP for SD-WAN integration.

FortiSASE 23.2 Documentation: Details on setting up routing adjacencies using BGP for Secure Private Access with SD-WAN.

A FortiSASE administrator is configuring a Secure Private Access (SPA) solution to share endpoint information with a corporate FortiGate.

Which three configuration actions will achieve this solution? (Choose three.)

A.
Add the FortiGate IP address in the secure private access configuration on FortiSASE.
A.
Add the FortiGate IP address in the secure private access configuration on FortiSASE.
Answers
B.
Use the FortiClient EMS cloud connector on the corporate FortiGate to connect to FortiSASE
B.
Use the FortiClient EMS cloud connector on the corporate FortiGate to connect to FortiSASE
Answers
C.
Register FortiGate and FortiSASE under the same FortiCloud account.
C.
Register FortiGate and FortiSASE under the same FortiCloud account.
Answers
D.
Authorize the corporate FortiGate on FortiSASE as a ZTNA access proxy.
D.
Authorize the corporate FortiGate on FortiSASE as a ZTNA access proxy.
Answers
E.
Apply the FortiSASE zero trust network access (ZTNA) license on the corporate FortiGate.
E.
Apply the FortiSASE zero trust network access (ZTNA) license on the corporate FortiGate.
Answers
Suggested answer: A, B, C

Explanation:

To configure a Secure Private Access (SPA) solution to share endpoint information between FortiSASE and a corporate FortiGate, you need to take the following steps:

Add the FortiGate IP address in the secure private access configuration on FortiSASE:

This step allows FortiSASE to recognize and establish a connection with the corporate FortiGate.

Use the FortiClient EMS cloud connector on the corporate FortiGate to connect to FortiSASE:

The EMS (Endpoint Management Server) cloud connector facilitates the integration between FortiClient endpoints and FortiSASE, enabling seamless sharing of endpoint information.

Register FortiGate and FortiSASE under the same FortiCloud account:

By registering both FortiGate and FortiSASE under the same FortiCloud account, you ensure centralized management and synchronization of configurations and policies.

FortiOS 7.2 Administration Guide: Provides details on configuring Secure Private Access and integrating with FortiGate.

FortiSASE 23.2 Documentation: Explains how to set up and manage connections between FortiSASE and corporate FortiGate.

Refer to the exhibit.

The daily report for application usage shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

A.
Certificate inspection is not being used to scan application traffic.
A.
Certificate inspection is not being used to scan application traffic.
Answers
B.
The inline-CASB application control profile does not have application categories set to Monitor
B.
The inline-CASB application control profile does not have application categories set to Monitor
Answers
C.
Zero trust network access (ZTNA) tags are not being used to tag the correct users.
C.
Zero trust network access (ZTNA) tags are not being used to tag the correct users.
Answers
D.
Deep inspection is not being used to scan traffic.
D.
Deep inspection is not being used to scan traffic.
Answers
Suggested answer: A, D

Explanation:

The unusually high number of unknown applications by category in the daily report for application usage can be attributed to the following reasons:

Certificate Inspection is not being used to scan application traffic:

Without certificate inspection, encrypted traffic cannot be adequately analyzed, leading to a higher number of unknown applications.

Certificate inspection allows the FortiSASE to decrypt and inspect HTTPS traffic, identifying applications correctly.

Deep Inspection is not being used to scan traffic:

Deep inspection goes beyond basic traffic analysis, performing thorough examination of packet contents to identify applications accurately.

If deep inspection is not enabled, many applications may go unrecognized and categorized as unknown.

FortiOS 7.2 Administration Guide: Details on certificate inspection and deep inspection configurations.

FortiSASE 23.2 Documentation: Explains the importance of deep inspection and certificate inspection in accurate application identification.

When viewing the daily summary report generated by FortiSASE. the administrator notices that the report contains very little data. What is a possible explanation for this almost empty report?

A.
Digital experience monitoring is not configured.
A.
Digital experience monitoring is not configured.
Answers
B.
Log allowed traffic is set to Security Events for all policies.
B.
Log allowed traffic is set to Security Events for all policies.
Answers
C.
The web filter security profile is not set to Monitor
C.
The web filter security profile is not set to Monitor
Answers
D.
There are no security profile group applied to all policies.
D.
There are no security profile group applied to all policies.
Answers
Suggested answer: B

Explanation:

If the daily summary report generated by FortiSASE contains very little data, one possible explanation is that the 'Log allowed traffic' setting is configured to log only 'Security Events' for all policies. This configuration limits the amount of data logged, as it only includes security events and excludes normal allowed traffic.

Log Allowed Traffic Setting:

The 'Log allowed traffic' setting determines which types of traffic are logged.

When set to 'Security Events,' only traffic that triggers a security event (such as a threat detection or policy violation) is logged.

Impact on Report Data:

If the log setting excludes regular allowed traffic, the amount of data captured and reported is significantly reduced.

This results in reports with minimal data, as only security-related events are included.

FortiOS 7.2 Administration Guide: Provides details on configuring logging settings for traffic policies.

FortiSASE 23.2 Documentation: Explains the impact of logging configurations on report generation and data visibility.

Total 30 questions
Go to page: of 3