ExamGecko
Home / Fortinet / FCSS_SASE_AD-23 / List of questions
Ask Question

Fortinet FCSS_SASE_AD-23 Practice Test - Questions Answers

Add to Whishlist

List of questions

Question 1

Report Export Collapse

What are two advantages of using zero-trust tags? (Choose two.)

Zero-trust tags can be used to allow or deny access to network resources
Zero-trust tags can be used to allow or deny access to network resources
Zero-trust tags can determine the security posture of an endpoint.
Zero-trust tags can determine the security posture of an endpoint.
Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints
Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints
Zero-trust tags can be used to allow secure web gateway (SWG) access
Zero-trust tags can be used to allow secure web gateway (SWG) access
Suggested answer: A, B
Explanation:

Zero-trust tags are critical in implementing zero-trust network access (ZTNA) policies. Here are the two key advantages of using zero-trust tags:

Access Control (Allow or Deny):

Zero-trust tags can be used to define policies that either allow or deny access to specific network resources based on the tag associated with the user or device.

This granular control ensures that only authorized users or devices with the appropriate tags can access sensitive resources, thereby enhancing security.

Determining Security Posture:

Zero-trust tags can be utilized to assess and determine the security posture of an endpoint.

Based on the assigned tags, FortiSASE can evaluate the device's compliance with security policies, such as antivirus status, patch levels, and configuration settings.

Devices that do not meet the required security posture can be restricted from accessing the network or given limited access.

FortiOS 7.2 Administration Guide: Provides detailed information on configuring and using zero-trust tags for access control and security posture assessment.

FortiSASE 23.2 Documentation: Explains how zero-trust tags are implemented and used within the FortiSASE environment for enhancing security and compliance.

asked 18/09/2024
Kefash White
44 questions

Question 2

Report Export Collapse

Refer to the exhibit.

Fortinet FCSS_SASE_AD-23 image Question 2 26045 09182024185920000000

In the user connection monitor, the FortiSASE administrator notices the user name is showing random characters. Which configuration change must the administrator make to get proper user information?

Turn off log anonymization on FortiSASE.
Turn off log anonymization on FortiSASE.
Add more endpoint licenses on FortiSASE.
Add more endpoint licenses on FortiSASE.
Configure the username using FortiSASE naming convention.
Configure the username using FortiSASE naming convention.
Change the deployment type from SWG to VPN.
Change the deployment type from SWG to VPN.
Suggested answer: A
Explanation:

In the user connection monitor, the random characters shown for the username indicate that log anonymization is enabled. Log anonymization is a feature that hides the actual user information in the logs for privacy and security reasons. To display proper user information, you need to disable log anonymization.

Log Anonymization:

When log anonymization is turned on, the actual usernames are replaced with random characters to protect user privacy.

This feature can be beneficial in certain environments but can cause issues when detailed user monitoring is required.

Disabling Log Anonymization:

Navigate to the FortiSASE settings.

Locate the log settings section.

Disable the log anonymization feature to ensure that actual usernames are displayed in the logs and user connection monitors.

FortiSASE 23.2 Documentation: Provides detailed steps on enabling and disabling log anonymization.

Fortinet Knowledge Base: Explains the impact of log anonymization on user monitoring and logging.

asked 18/09/2024
Misael E
43 questions

Question 3

Report Export Collapse

Refer to the exhibit.

Fortinet FCSS_SASE_AD-23 image Question 3 26046 09182024185920000000

To allow access, which web tiller configuration must you change on FortiSASE?

FortiGuard category-based filter
FortiGuard category-based filter
content filter
content filter
URL Filter
URL Filter
inline cloud access security broker (CASB) headers
inline cloud access security broker (CASB) headers
Suggested answer: C
Explanation:

The exhibit indicates that the URL https://www.bbc.com/ is being blocked due to containing a banned word ('fight'). To allow access to this specific URL, you need to adjust the URL filter settings on FortiSASE.

URL Filtering:

URL filtering allows administrators to define policies that block or allow access to specific URLs or URL patterns.

In this case, the URL filter is set to block any URL containing the word 'fight.'

Modifying URL Filter:

Navigate to the Web Filter configuration in FortiSASE.

Locate the URL filter settings.

Add an exception for the URL https://www.bbc.com/ to allow access, even if it contains a banned word.

Alternatively, remove or adjust the banned word list to exclude the word 'fight' if it's not critical to the security policy.

FortiOS 7.2 Administration Guide: Provides details on configuring and managing URL filters.

FortiSASE 23.2 Documentation: Explains how to set up and modify web filtering policies, including URL filters.

asked 18/09/2024
Ben Pike
45 questions

Question 4

Report Export Collapse

Which policy type is used to control traffic between the FortiClient endpoint to FortiSASE for secure internet access?

VPN policy
VPN policy
thin edge policy
thin edge policy
private access policy
private access policy
secure web gateway (SWG) policy
secure web gateway (SWG) policy
Suggested answer: D
Explanation:

The Secure Web Gateway (SWG) policy is used to control traffic between the FortiClient endpoint and FortiSASE for secure internet access. SWG provides comprehensive web security by enforcing policies that manage and monitor user access to the internet.

Secure Web Gateway (SWG) Policy:

SWG policies are designed to protect users from web-based threats and enforce acceptable use policies.

These policies control and monitor user traffic to and from the internet, ensuring that security protocols are followed.

Traffic Control:

The SWG policy intercepts all web traffic, inspects it, and applies security rules before allowing or blocking access.

This policy type is crucial for providing secure internet access to users connecting through FortiSASE.

FortiOS 7.2 Administration Guide: Details on configuring and managing SWG policies.

FortiSASE 23.2 Documentation: Explains the role of SWG in securing internet access for endpoints.

asked 18/09/2024
mr Craig Ferguson
39 questions

Question 5

Report Export Collapse

Refer to the exhibits.

Fortinet FCSS_SASE_AD-23 image Question 5 26048 09182024185920000000

WiMO-Pro and Win7-Pro are endpoints from the same remote location. WiMO-Pro can access the internet though FortiSASE, while Wm7-Pro can no longer access the internet

Given the exhibits, which reason explains the outage on Wm7-Pro?

The Win7-Pro device posture has changed.
The Win7-Pro device posture has changed.
Win7-Pro cannot reach the FortiSASE SSL VPN gateway
Win7-Pro cannot reach the FortiSASE SSL VPN gateway
The Win7-Pro FortiClient version does not match the FortiSASE endpoint requirement.
The Win7-Pro FortiClient version does not match the FortiSASE endpoint requirement.
Win-7 Pro has exceeded the total vulnerability detected threshold.
Win-7 Pro has exceeded the total vulnerability detected threshold.
Suggested answer: D
Explanation:

Based on the provided exhibits, the reason why the Win7-Pro endpoint can no longer access the internet through FortiSASE is due to exceeding the total vulnerability detected threshold. This threshold is used to determine if a device is compliant with the security requirements to access the network.

Endpoint Compliance:

FortiSASE monitors endpoint compliance by assessing various security parameters, including the number of vulnerabilities detected on the device.

The compliance status is indicated by the ZTNA tags and the vulnerabilities detected.

Vulnerability Threshold:

The exhibit shows that Win7-Pro has 176 vulnerabilities detected, whereas Win10-Pro has 140 vulnerabilities.

If the endpoint exceeds a predefined vulnerability threshold, it may be restricted from accessing the network to ensure overall network security.

Impact on Network Access:

Since Win7-Pro has exceeded the vulnerability threshold, it is marked as non-compliant and subsequently loses internet access through FortiSASE.

The FortiSASE endpoint profile enforces this compliance check to prevent potentially vulnerable devices from accessing the internet.

FortiOS 7.2 Administration Guide: Provides information on endpoint compliance and vulnerability management.

FortiSASE 23.2 Documentation: Explains how vulnerability thresholds are used to determine endpoint compliance and access control.

asked 18/09/2024
Alexander Goris
30 questions

Question 6

Report Export Collapse

A customer wants to upgrade their legacy on-premises proxy to a could-based proxy for a hybrid network. Which FortiSASE features would help the customer to achieve this outcome?

Become a Premium Member for full access
  Unlock Premium Member

Question 7

Report Export Collapse

When you configure FortiSASE Secure Private Access (SPA) with SD-WAN integration, you must establish a routing adjacency between FortiSASE and the FortiGate SD-WAN hub. Which routing protocol must you use?

Become a Premium Member for full access
  Unlock Premium Member

Question 8

Report Export Collapse

A FortiSASE administrator is configuring a Secure Private Access (SPA) solution to share endpoint information with a corporate FortiGate.

Which three configuration actions will achieve this solution? (Choose three.)

Become a Premium Member for full access
  Unlock Premium Member

Question 9

Report Export Collapse

Refer to the exhibit.

Fortinet FCSS_SASE_AD-23 image Question 9 26052 09182024185920000000

The daily report for application usage shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 10

Report Export Collapse

When viewing the daily summary report generated by FortiSASE. the administrator notices that the report contains very little data. What is a possible explanation for this almost empty report?

Become a Premium Member for full access
  Unlock Premium Member
Total 30 questions
Go to page: of 3
Search

Related questions