ExamGecko
Home Home / Fortinet / FCSS_SASE_AD-23

Fortinet FCSS_SASE_AD-23 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Related questions











Refer to the exhibits.

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The VPN tunnel does not establish

Based on the provided configuration, what configuration needs to be modified to bring the tunnel up?

A.
NAT needs to be enabled in the Spoke-to-Hub firewall policy.
A.
NAT needs to be enabled in the Spoke-to-Hub firewall policy.
Answers
B.
The BGP router ID needs to match on the hub and FortiSASE.
B.
The BGP router ID needs to match on the hub and FortiSASE.
Answers
C.
FortiSASE spoke devices do not support mode config.
C.
FortiSASE spoke devices do not support mode config.
Answers
D.
The hub needs IKEv2 enabled in the IPsec phase 1 settings.
D.
The hub needs IKEv2 enabled in the IPsec phase 1 settings.
Answers
Suggested answer: C

Explanation:

The VPN tunnel between the FortiSASE spoke and the FortiGate hub is not establishing due to the configuration of mode config, which is not supported by FortiSASE spoke devices. Mode config is used to assign IP addresses to VPN clients dynamically, but this feature is not applicable to FortiSASE spokes.

Mode Config in IPsec:

The configuration snippet shows that mode config is enabled in the IPsec phase 1 settings.

Mode config is typically used for VPN clients to dynamically receive an IP address from the VPN server, but it is not suitable for site-to-site VPN configurations involving FortiSASE spokes.

Configuration Adjustment:

To establish the VPN tunnel, you need to disable mode config in the IPsec phase 1 settings.

This adjustment will allow the FortiSASE spoke to properly establish the VPN tunnel with the FortiGate hub.

Steps to Disable Mode Config:

Access the VPN configuration on the FortiSASE spoke.

Edit the IPsec phase 1 settings to disable mode config.

Ensure other settings such as pre-shared key, remote gateway, and BGP configurations are correct and consistent with the FortiGate hub.

FortiOS 7.2 Administration Guide: Provides details on configuring IPsec VPNs and mode config settings.

FortiSASE 23.2 Documentation: Explains the supported configurations for FortiSASE spoke devices and VPN setups.

Which two additional components does FortiSASE use for application control to act as an inline-CASB? (Choose two.)

A.
intrusion prevention system (IPS)
A.
intrusion prevention system (IPS)
Answers
B.
SSL deep inspection
B.
SSL deep inspection
Answers
C.
DNS filter
C.
DNS filter
Answers
D.
Web filter with inline-CASB
D.
Web filter with inline-CASB
Answers
Suggested answer: B, D

Explanation:

FortiSASE uses the following components for application control to act as an inline-CASB (Cloud Access Security Broker):

SSL Deep Inspection:

SSL deep inspection is essential for decrypting and inspecting HTTPS traffic to identify and control applications and data transfers within encrypted traffic.

This allows FortiSASE to enforce security policies on SSL/TLS encrypted traffic, providing visibility and control over cloud applications.

Web Filter with Inline-CASB:

The web filter component integrates with inline-CASB to monitor and control access to cloud applications based on predefined security policies.

This combination provides granular control over cloud application usage, ensuring compliance with security policies and preventing unauthorized data transfers.

FortiOS 7.2 Administration Guide: Details on SSL deep inspection and web filtering configurations.

FortiSASE 23.2 Documentation: Explains how FortiSASE acts as an inline-CASB using SSL deep inspection and web filtering.

Which two advantages does FortiSASE bring to businesses with multiple branch offices? (Choose two.)

A.
It offers centralized management for simplified administration.
A.
It offers centralized management for simplified administration.
Answers
B.
It enables seamless integration with third-party firewalls.
B.
It enables seamless integration with third-party firewalls.
Answers
C.
it offers customizable dashboard views for each branch location
C.
it offers customizable dashboard views for each branch location
Answers
D.
It eliminates the need to have an on-premises firewall for each branch.
D.
It eliminates the need to have an on-premises firewall for each branch.
Answers
Suggested answer: A, D

Explanation:

FortiSASE brings the following advantages to businesses with multiple branch offices:

Centralized Management for Simplified Administration:

FortiSASE provides a centralized management platform that allows administrators to manage security policies, configurations, and monitoring from a single interface.

This simplifies the administration and reduces the complexity of managing multiple branch offices.

Eliminates the Need for On-Premises Firewalls:

FortiSASE enables secure access to the internet and cloud applications without requiring dedicated on-premises firewalls at each branch office.

This reduces hardware costs and simplifies network architecture, as security functions are handled by the cloud-based FortiSASE solution.

FortiOS 7.2 Administration Guide: Provides information on the benefits of centralized management and cloud-based security solutions.

FortiSASE 23.2 Documentation: Explains the advantages of using FortiSASE for businesses with multiple branch offices, including reduced need for on-premises firewalls.

When accessing the FortiSASE portal for the first time, an administrator must select data center locations for which three FortiSASE components? (Choose three.)

A.
Endpoint management
A.
Endpoint management
Answers
B.
Points of presence
B.
Points of presence
Answers
C.
SD-WAN hub
C.
SD-WAN hub
Answers
D.
Logging
D.
Logging
Answers
E.
Authentication
E.
Authentication
Answers
Suggested answer: A, B, D

Explanation:

When accessing the FortiSASE portal for the first time, an administrator must select data center locations for the following FortiSASE components:

Endpoint Management:

The data center location for endpoint management ensures that endpoint data and policies are managed and stored within the chosen geographical region.

Points of Presence (PoPs):

Points of Presence (PoPs) are the locations where FortiSASE services are delivered to users. Selecting PoP locations ensures optimal performance and connectivity for users based on their geographical distribution.

Logging:

The data center location for logging determines where log data is stored and managed. This is crucial for compliance and regulatory requirements, as well as for efficient log analysis and reporting.

FortiOS 7.2 Administration Guide: Details on initial setup and configuration steps for FortiSASE.

FortiSASE 23.2 Documentation: Explains the importance of selecting data center locations for various FortiSASE components.

During FortiSASE provisioning, how many security points of presence (POPs) need to be configured by the FortiSASE administrator?

A.
3
A.
3
Answers
B.
4
B.
4
Answers
C.
2
C.
2
Answers
D.
1
D.
1
Answers
Suggested answer: D

Explanation:

During FortiSASE provisioning, the FortiSASE administrator needs to configure at least one security point of presence (PoP). A single PoP is sufficient to get started with FortiSASE, providing the necessary security services and connectivity for users.

Security Point of Presence (PoP):

A PoP is a strategically located data center that provides security services such as secure web gateway, firewall, and VPN termination.

Configuring at least one PoP ensures that users can connect to FortiSASE and benefit from its security features.

Scalability:

While only one PoP is required to start, additional PoPs can be added as needed to enhance redundancy, load balancing, and performance.

FortiOS 7.2 Administration Guide: Provides details on the provisioning process for FortiSASE.

FortiSASE 23.2 Documentation: Explains the configuration and role of security PoPs in the FortiSASE architecture.

Which role does FortiSASE play in supporting zero trust network access (ZTNA) principles9

A.
It offers hardware-based firewalls for network segmentation.
A.
It offers hardware-based firewalls for network segmentation.
Answers
B.
It integrates with software-defined network (SDN) solutions.
B.
It integrates with software-defined network (SDN) solutions.
Answers
C.
It can identify attributes on the endpoint for security posture check.
C.
It can identify attributes on the endpoint for security posture check.
Answers
D.
It enables VPN connections for remote employees.
D.
It enables VPN connections for remote employees.
Answers
Suggested answer: C

Explanation:

FortiSASE supports zero trust network access (ZTNA) principles by identifying attributes on the endpoint for security posture checks. ZTNA principles require continuous verification of user and device credentials, as well as their security posture, before granting access to network resources.

Security Posture Check:

FortiSASE can evaluate the security posture of endpoints by checking for compliance with security policies, such as antivirus status, patch levels, and configuration settings.

This ensures that only compliant and secure devices are granted access to the network.

Zero Trust Network Access (ZTNA):

ZTNA is based on the principle of 'never trust, always verify,' which requires continuous assessment of user and device trustworthiness.

FortiSASE plays a crucial role in implementing ZTNA by performing these security posture checks and enforcing access control policies.

FortiOS 7.2 Administration Guide: Provides information on ZTNA and endpoint security posture checks.

FortiSASE 23.2 Documentation: Details on how FortiSASE implements ZTNA principles.

When deploying FortiSASE agent-based clients, which three features are available compared to an agentless solution? (Choose three.)

A.
Vulnerability scan
A.
Vulnerability scan
Answers
B.
SSL inspection
B.
SSL inspection
Answers
C.
Anti-ransomware protection
C.
Anti-ransomware protection
Answers
D.
Web filter
D.
Web filter
Answers
E.
ZTNA tags
E.
ZTNA tags
Answers
Suggested answer: A, B, D

Explanation:

When deploying FortiSASE agent-based clients, several features are available that are not typically available with an agentless solution. These features enhance the security and management capabilities for endpoints.

Vulnerability Scan:

Agent-based clients can perform vulnerability scans on endpoints to identify and remediate security weaknesses.

This proactive approach helps to ensure that endpoints are secure and compliant with security policies.

SSL Inspection:

Agent-based clients can perform SSL inspection to decrypt and inspect encrypted traffic for threats.

This feature is critical for detecting malicious activities hidden within SSL/TLS encrypted traffic.

Web Filter:

Web filtering is a key feature available with agent-based clients, allowing administrators to control and monitor web access.

This feature helps enforce acceptable use policies and protect users from web-based threats.

FortiOS 7.2 Administration Guide: Explains the features and benefits of deploying agent-based clients.

FortiSASE 23.2 Documentation: Details the differences between agent-based and agentless solutions and the additional features provided by agent-based deployments.

Which FortiSASE feature ensures least-privileged user access to all applications?

A.
secure web gateway (SWG)
A.
secure web gateway (SWG)
Answers
B.
SD-WAN
B.
SD-WAN
Answers
C.
zero trust network access (ZTNA)
C.
zero trust network access (ZTNA)
Answers
D.
thin branch SASE extension
D.
thin branch SASE extension
Answers
Suggested answer: C

Explanation:

Zero Trust Network Access (ZTNA) is the FortiSASE feature that ensures least-privileged user access to all applications. ZTNA operates on the principle of 'never trust, always verify,' providing secure access based on the identity of users and devices, regardless of their location.

Zero Trust Network Access (ZTNA):

ZTNA ensures that only authenticated and authorized users and devices can access applications.

It applies the principle of least privilege by granting access only to the resources required by the user, minimizing the potential for unauthorized access.

Implementation:

ZTNA continuously verifies user and device trustworthiness and enforces granular access control policies.

This approach enhances security by reducing the attack surface and limiting lateral movement within the network.

FortiOS 7.2 Administration Guide: Provides detailed information on ZTNA and its role in ensuring least-privileged access.

FortiSASE 23.2 Documentation: Explains the implementation and benefits of ZTNA within the FortiSASE environment.

Which two components are part of onboarding a secure web gateway (SWG) endpoint? (Choose two)

A.
FortiSASE CA certificate
A.
FortiSASE CA certificate
Answers
B.
proxy auto-configuration (PAC) file
B.
proxy auto-configuration (PAC) file
Answers
C.
FortiSASE invitation code
C.
FortiSASE invitation code
Answers
D.
FortiClient installer
D.
FortiClient installer
Answers
Suggested answer: A, B

Explanation:

Onboarding a Secure Web Gateway (SWG) endpoint involves several components to ensure secure and effective integration with FortiSASE. Two key components are the FortiSASE CA certificate and the proxy auto-configuration (PAC) file.

FortiSASE CA Certificate:

The FortiSASE CA certificate is essential for establishing trust between the endpoint and the FortiSASE infrastructure.

It ensures that the endpoint can securely communicate with FortiSASE services and inspect SSL/TLS traffic.

Proxy Auto-Configuration (PAC) File:

The PAC file is used to configure the endpoint to direct web traffic through the FortiSASE proxy.

It provides instructions on how to route traffic, ensuring that all web requests are properly inspected and filtered by FortiSASE.

FortiOS 7.2 Administration Guide: Details on onboarding endpoints and configuring SWG.

FortiSASE 23.2 Documentation: Explains the components required for integrating endpoints with FortiSASE and the process for deploying the CA certificate and PAC file.

An organization needs to resolve internal hostnames using its internal rather than public DNS servers for remotely connected endpoints. Which two components must be configured on FortiSASE to achieve this? (Choose two.)

A.
SSL deep inspection
A.
SSL deep inspection
Answers
B.
Split DNS rules
B.
Split DNS rules
Answers
C.
Split tunnelling destinations
C.
Split tunnelling destinations
Answers
D.
DNS filter
D.
DNS filter
Answers
Suggested answer: B, C

Explanation:

To resolve internal hostnames using internal DNS servers for remotely connected endpoints, the following two components must be configured on FortiSASE:

Split DNS Rules:

Split DNS allows the configuration of specific DNS queries to be directed to internal DNS servers instead of public DNS servers.

This ensures that internal hostnames are resolved using the organization's internal DNS infrastructure, maintaining privacy and accuracy for internal network resources.

Split Tunneling Destinations:

Split tunneling allows specific traffic (such as DNS queries for internal domains) to be routed through the VPN tunnel while other traffic is sent directly to the internet.

By configuring split tunneling destinations, you can ensure that DNS queries for internal hostnames are directed through the VPN to the internal DNS servers.

FortiOS 7.2 Administration Guide: Provides details on configuring split DNS and split tunneling for VPN clients.

FortiSASE 23.2 Documentation: Explains the implementation and configuration of split DNS and split tunneling for securely resolving internal hostnames.


Total 30 questions
Go to page: of 3