Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

FCSS_SASE_AD-25 Exam Dumps - FCSS - FortiSASE 25 Administrator

Go to page:
Question # 9

What can be configured on FortiSASE as an additional layer of security for FortiClient registration?

A.

security posture tags

B.

application inventory

C.

user verification

D.

device identification

Full Access
Question # 10

An administrator must restrict endpoints from certain countries from connecting to FortiSASE.

Which configuration can achieve this?

A.

Configure a network lockdown policy on the endpoint profiles.

B.

Configure a geography address object as the source for a deny policy.

C.

Configure geofencing to restrict access from the required countries.

D.

Configure source IP anchoring to restrict access from the specified countries.

Full Access
Question # 11

Which information can an administrator monitor using reports generated on FortiSASE?

A.

sanctioned and unsanctioned Software-as-a-Service (SaaS) applications usage

B.

FortiClient vulnerability assessment

C.

SD-WAN performance

D.

FortiSASE administrator and system events

Full Access
Question # 12

Refer to the exhibit.

The daily report for application usage for internet traffic shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

A.

Certificate inspection is not being used to scan application traffic.

B.

Deep inspection is not being used to scan traffic.

C.

The private access policy must be to set to log Security Events.

D.

The inline-CASB application control profile does not have application categories set to Monitor.

Full Access
Question # 13

How can digital experience monitoring (DEM) on an endpoint assist in diagnosing connectivity and network issues?

A.

FortiSASE runs a ping from the endpoint to calculate the TTL to the SaaS application.

B.

FortiSASE runs SNMP traps to the endpoint using the DEM agent to verify the SaaS application health status.

C.

FortiSASE runs a netstat from the endpoint to the SaaS application to see if ports are open.

D.

FortiSASE runs a trace job on the endpoint using the DEM agent to the Software-as-a-Service (SaaS) application.

Full Access
Question # 14

Which statement best describes the Digital Experience Monitor (DEM) feature on FortiSASE?

A.

It provides end-to-end network visibility from all the FortiSASE security PoPs to a specific SaaS application.

B.

It gathers all the vulnerability information from all the FortiClient endpoints.

C.

It is used for performing device compliance checks on endpoints.

D.

It monitors the FortiSASE POP health based on ping probes.

Full Access
Question # 15

Your organization is currently using FortiSASE for its cybersecurity. They have recently hired a contractor who will work from the HQ office and who needs temporary internet access in order to set up a web-based point of sale (POS) system.

What is the recommended way to provide internet access to the contractor?

A.

Use zero trust network access (ZTNA) and tag the client as an unmanaged endpoint.

B.

Use the self-registration portal on FortiSASE to grant internet access.

C.

Use a tunnel policy with a contractors user group as the source on FortiSASE to provide internet access.

D.

Use a proxy auto-configuration (PAC) file and provide secure web gateway (SWG) service as an explicit web proxy.

Full Access
Go to page: