ExamGecko
Home / Fortinet / FCSS_SASE_AD-23 / List of questions
Ask Question

Fortinet FCSS_SASE_AD-23 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

You are designing a new network for Company X and one of the new cybersecurity policy requirements is that all remote user endpoints must always be connected and protected Which FortiSASE component facilitates this always-on security measure?

Become a Premium Member for full access
  Unlock Premium Member

Question 12

Report Export Collapse

Refer to the exhibits.

Fortinet FCSS_SASE_AD-23 image Question 12 26055 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 12 26055 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 12 26055 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 12 26055 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 12 26055 09182024185920000000

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The tunnel is up to the FortiGale hub. However, the administrator is not able to ping the webserver hosted behind the FortiGate hub.

Based on the output, what is the reason for the ping failures?

Become a Premium Member for full access
  Unlock Premium Member

Question 13

Report Export Collapse

To complete their day-to-day operations, remote users require access to a TCP-based application that is hosted on a private web server. Which FortiSASE deployment use case provides the most efficient and secure method for meeting the remote users' requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 14

Report Export Collapse

Refer to the exhibits.

Fortinet FCSS_SASE_AD-23 image Question 14 26057 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 14 26057 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 14 26057 09182024185920000000

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org. Traffic logs show traffic is allowed by the policy.

Which configuration on FortiSASE is allowing users to perform the download?

Become a Premium Member for full access
  Unlock Premium Member

Question 15

Report Export Collapse

An organization wants to block all video and audio application traffic but grant access to videos from CNN Which application override action must you configure in the Application Control with Inline-CASB?

Become a Premium Member for full access
  Unlock Premium Member

Question 16

Report Export Collapse

Refer to the exhibits.

Fortinet FCSS_SASE_AD-23 image Question 16 26059 09182024185920000000

Fortinet FCSS_SASE_AD-23 image Question 16 26059 09182024185920000000

When remote users connected to FortiSASE require access to internal resources on Branch-2. how will traffic be routed?

Become a Premium Member for full access
  Unlock Premium Member

Question 17

Report Export Collapse

Which two deployment methods are used to connect a FortiExtender as a FortiSASE LAN extension? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 18

Report Export Collapse

How does FortiSASE hide user information when viewing and analyzing logs?

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

Refer to the exhibit.

Fortinet FCSS_SASE_AD-23 image Question 19 26062 09182024185920000000

A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.

Which configuration must you apply to achieve this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

Which secure internet access (SIA) use case minimizes individual workstation or device setup, because you do not need to install FortiClient on endpoints or configure explicit web proxy settings on web browser-based end points?

Become a Premium Member for full access
  Unlock Premium Member
Total 30 questions
Go to page: of 3
Search

Related questions