ExamGecko
Home / Fortinet / FCSS_SASE_AD-23 / List of questions
Ask Question

Fortinet FCSS_SASE_AD-23 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

You are designing a new network for Company X and one of the new cybersecurity policy requirements is that all remote user endpoints must always be connected and protected Which FortiSASE component facilitates this always-on security measure?

site-based deployment
site-based deployment
thin-branch SASE extension
thin-branch SASE extension
unified FortiClient
unified FortiClient
inline-CASB
inline-CASB
Suggested answer: C
Explanation:

The unified FortiClient component of FortiSASE facilitates the always-on security measure required for ensuring that all remote user endpoints are always connected and protected.

Unified FortiClient:

FortiClient is a comprehensive endpoint security solution that integrates with FortiSASE to provide continuous protection for remote user endpoints.

It ensures that endpoints are always connected to the FortiSASE infrastructure, even when users are off the corporate network.

Always-On Security:

The unified FortiClient maintains a persistent connection to FortiSASE, enforcing security policies and protecting endpoints against threats at all times.

This ensures compliance with the cybersecurity policy requiring constant connectivity and protection for remote users.

FortiOS 7.2 Administration Guide: Provides information on configuring and managing FortiClient for endpoint security.

FortiSASE 23.2 Documentation: Explains how FortiClient integrates with FortiSASE to deliver always-on security for remote endpoints.

asked 18/09/2024
Bassem Louati
36 questions

Question 12

Report Export Collapse

Refer to the exhibits.

Fortinet FCSS_SASE_AD-23 image Question 12 26055 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 12 26055 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 12 26055 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 12 26055 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 12 26055 09182024185920000000

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The tunnel is up to the FortiGale hub. However, the administrator is not able to ping the webserver hosted behind the FortiGate hub.

Based on the output, what is the reason for the ping failures?

The Secure Private Access (SPA) policy needs to allow PING service.
The Secure Private Access (SPA) policy needs to allow PING service.
Quick mode selectors are restricting the subnet.
Quick mode selectors are restricting the subnet.
The BGP route is not received.
The BGP route is not received.
Network address translation (NAT) is not enabled on the spoke-to-hub policy.
Network address translation (NAT) is not enabled on the spoke-to-hub policy.
Suggested answer: B
Explanation:

The reason for the ping failures is due to the quick mode selectors restricting the subnet. Quick mode selectors define the IP ranges and protocols that are allowed through the VPN tunnel, and if they are not configured correctly, traffic to certain subnets can be blocked.

Quick Mode Selectors:

Quick mode selectors specify the source and destination subnets that are allowed to communicate through the VPN tunnel.

If the selectors do not include the subnet of the webserver (192.168.10.0/24), then the traffic will be restricted, and the ping will fail.

Diagnostic Output:

The diagnostic output shows the VPN configuration details, but it is important to check the quick mode selectors to ensure that the necessary subnets are included.

If the quick mode selectors are too restrictive, they will prevent traffic to and from the specified subnets.

Configuration Check:

Verify the quick mode selectors on both the FortiSASE and FortiGate hub to ensure they match and include the subnet of the webserver.

Adjust the selectors to allow the necessary subnets for successful communication.

FortiOS 7.2 Administration Guide: Provides detailed information on configuring VPN tunnels and quick mode selectors.

FortiSASE 23.2 Documentation: Explains how to set up and manage VPN tunnels, including the configuration of quick mode selectors.

asked 18/09/2024
john wick
41 questions

Question 13

Report Export Collapse

To complete their day-to-day operations, remote users require access to a TCP-based application that is hosted on a private web server. Which FortiSASE deployment use case provides the most efficient and secure method for meeting the remote users' requirements?

SD-WAN private access
SD-WAN private access
inline-CASB
inline-CASB
zero trust network access (ZTNA) private access
zero trust network access (ZTNA) private access
next generation firewall (NGFW)
next generation firewall (NGFW)
Suggested answer: C
Explanation:

Zero Trust Network Access (ZTNA) private access provides the most efficient and secure method for remote users to access a TCP-based application hosted on a private web server. ZTNA ensures that only authenticated and authorized users can access specific applications based on predefined policies, enhancing security and access control.

Zero Trust Network Access (ZTNA):

ZTNA operates on the principle of 'never trust, always verify,' continuously verifying user identity and device security posture before granting access.

It provides secure and granular access to specific applications, ensuring that remote users can securely access the TCP-based application hosted on the private web server.

Secure and Efficient Access:

ZTNA private access allows remote users to connect directly to the application without needing a full VPN tunnel, reducing latency and improving performance.

It ensures that only authorized users can access the application, providing robust security controls.

FortiOS 7.2 Administration Guide: Provides detailed information on ZTNA and its deployment use cases.

FortiSASE 23.2 Documentation: Explains how ZTNA can be used to provide secure access to private applications for remote users.

asked 18/09/2024
Renaldo Williams
45 questions

Question 14

Report Export Collapse

Refer to the exhibits.

Fortinet FCSS_SASE_AD-23 image Question 14 26057 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 14 26057 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 14 26057 09182024185920000000

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org. Traffic logs show traffic is allowed by the policy.

Which configuration on FortiSASE is allowing users to perform the download?

Web filter is allowing the traffic.
Web filter is allowing the traffic.
IPS is disabled in the security profile group.
IPS is disabled in the security profile group.
The HTTPS protocol is not enabled in the antivirus profile.
The HTTPS protocol is not enabled in the antivirus profile.
Force certificate inspection is enabled in the policy.
Force certificate inspection is enabled in the policy.
Suggested answer: A
Explanation:

Based on the provided exhibits and the configuration details, the reason why users are still able to download the eicar.com-zip file despite having an antivirus profile applied is due to the Web Filter allowing the traffic. Here is the step-by-step detailed explanation:

Web Filtering Logs Analysis:

The logs show that the traffic to the destination port 443 (which is HTTPS) is allowed and the security event triggered is Web Filter.

The log details indicate that the URL belongs to an allowed category in the policy and thus, the traffic is permitted by the Web Filter.

Security Profile Group Configuration:

The Web Filter with Inline-CASB section indicates that the site www.eicar.org is being monitored (93 occurrences) and not blocked.

Since the Web Filter is set to allow traffic from this site, the antivirus profile will not block it because the Web Filter decision takes precedence.

Antivirus Profile Configuration:

Although the antivirus profile is configured, the logs do not show any antivirus actions being triggered. This indicates that the web filter is overriding the antivirus action.

Policy Configuration:

The policy named 'Web Traffic' shows that it has logging enabled and is set to accept traffic.

The profile group 'SIA' applied to this policy includes both Web Filter and Antivirus settings. However, since the Web Filter is allowing the traffic, the antivirus profile does not get the chance to inspect it.

FortiGate Security 7.2 Study Guide: Provides details on the precedence of web filtering over antivirus in security profiles.

Fortinet Knowledge Base: Detailed explanation of web filtering and antivirus profiles interaction.

asked 18/09/2024
Rickey Dickens
45 questions

Question 15

Report Export Collapse

An organization wants to block all video and audio application traffic but grant access to videos from CNN Which application override action must you configure in the Application Control with Inline-CASB?

Allow
Allow
Pass
Pass
Permit
Permit
Exempt
Exempt
Suggested answer: D
Explanation:

To block all video and audio application traffic while granting access to videos from CNN, you need to configure an application override action in the Application Control with Inline-CASB. Here is the step-by-step detailed explanation:

Application Control Configuration:

Application Control is used to identify and manage application traffic based on predefined or custom application signatures.

Inline-CASB (Cloud Access Security Broker) extends these capabilities by allowing more granular control over cloud applications.

Blocking Video and Audio Applications:

To block all video and audio application traffic, you can create a policy within Application Control to deny all categories related to video and audio streaming.

Granting Access to Specific Videos (CNN):

To allow access to videos from CNN specifically, you must create an override rule within the same Application Control profile.

The override action 'Exempt' ensures that traffic to specified URLs (such as those from CNN) is not subjected to the blocking rules set for other video and audio traffic.

Configuration Steps:

Navigate to the Application Control profile in the FortiSASE interface.

Set the application categories related to video and audio streaming to 'Block.'

Add a new override entry for CNN video traffic and set the action to 'Exempt.'

FortiOS 7.2 Administration Guide: Detailed steps on configuring Application Control and Inline-CASB.

Fortinet Training Institute: Provides scenarios and examples of using Application Control with Inline-CASB for specific use cases.

asked 18/09/2024
Justin Whelan
38 questions

Question 16

Report Export Collapse

Refer to the exhibits.

Fortinet FCSS_SASE_AD-23 image Question 16 26059 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 16 26059 09182024185920000000

When remote users connected to FortiSASE require access to internal resources on Branch-2. how will traffic be routed?

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2. which will then route traffic to Branch-2.
FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2. which will then route traffic to Branch-2.
FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a static route
FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a static route
FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1, which will then route traffic to Branch-2.
FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1, which will then route traffic to Branch-2.
FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route
FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route
Suggested answer: C
Explanation:

When remote users connected to FortiSASE require access to internal resources on Branch-2, the following process occurs:

SD-WAN Capability:

FortiSASE leverages SD-WAN to optimize traffic routing based on performance metrics and priorities.

In the priority settings, HUB-1 is configured with the highest priority (P1), whereas HUB-2 has a lower priority (P2).

Traffic Routing Decision:

FortiSASE evaluates the available hubs (HUB-1 and HUB-2) and selects HUB-1 due to its highest priority setting.

Once the traffic reaches HUB-1, it is then routed to the appropriate branch based on internal routing policies.

Branch-2 Access:

Since HUB-1 has the highest priority, FortiSASE directs the traffic to HUB-1.

HUB-1 then routes the traffic to Branch-2, providing the remote users access to the internal resources.

FortiOS 7.2 Administration Guide: Details on SD-WAN configurations and priority settings.

FortiSASE 23.2 Documentation: Explains how FortiSASE integrates with SD-WAN to route traffic based on defined priorities and performance metrics.

asked 18/09/2024
Nathalie Yip
41 questions

Question 17

Report Export Collapse

Which two deployment methods are used to connect a FortiExtender as a FortiSASE LAN extension? (Choose two.)

Connect FortiExtender to FortiSASE using FortiZTP
Connect FortiExtender to FortiSASE using FortiZTP
Enable Control and Provisioning Wireless Access Points (CAPWAP) access on the FortiSASE portal.
Enable Control and Provisioning Wireless Access Points (CAPWAP) access on the FortiSASE portal.
Enter the FortiSASE domain name in the FortiExtender GUI as a static discovery server
Enter the FortiSASE domain name in the FortiExtender GUI as a static discovery server
Configure an IPsec tunnel on FortiSASE to connect to FortiExtender.
Configure an IPsec tunnel on FortiSASE to connect to FortiExtender.
Suggested answer: A, C
Explanation:

There are two deployment methods used to connect a FortiExtender as a FortiSASE LAN extension:

Connect FortiExtender to FortiSASE using FortiZTP:

FortiZero Touch Provisioning (FortiZTP) simplifies the deployment process by allowing FortiExtender to automatically connect and configure itself with FortiSASE.

This method requires minimal manual configuration, making it efficient for large-scale deployments.

Enter the FortiSASE domain name in the FortiExtender GUI as a static discovery server:

Manually configuring the FortiSASE domain name in the FortiExtender GUI allows the extender to discover and connect to the FortiSASE infrastructure.

This static discovery method ensures that FortiExtender can establish a connection with FortiSASE using the provided domain name.

FortiOS 7.2 Administration Guide: Details on FortiExtender deployment methods and configurations.

FortiSASE 23.2 Documentation: Explains how to connect and configure FortiExtender with FortiSASE using FortiZTP and static discovery.

asked 18/09/2024
Amanuel Mesfin
51 questions

Question 18

Report Export Collapse

How does FortiSASE hide user information when viewing and analyzing logs?

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

Refer to the exhibit.

Fortinet FCSS_SASE_AD-23 image Question 19 26062 09182024185920000000

A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.

Which configuration must you apply to achieve this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

Which secure internet access (SIA) use case minimizes individual workstation or device setup, because you do not need to install FortiClient on endpoints or configure explicit web proxy settings on web browser-based end points?

Become a Premium Member for full access
  Unlock Premium Member
Total 30 questions
Go to page: of 3
Search

Related questions