FCSS_SASE_AD-24.pdf
Q: 1
Refer to the exhibits.
A FortiSASE administrator has configured an antivirus profile in the security profile group and applied
it to the internet access policy. Remote users are still able to download the eicar.com-zip file from
https://eicar.org. Traffic logs show traffic is allowed by the policy.
Which configuration on FortiSASE is allowing users to perform the download?
A FortiSASE administrator has configured an antivirus profile in the security profile group and applied
it to the internet access policy. Remote users are still able to download the eicar.com-zip file from
https://eicar.org. Traffic logs show traffic is allowed by the policy.
Which configuration on FortiSASE is allowing users to perform the download?Options
Q: 2
What are two requirements to enable the MSSP feature on FortiSASE? (Choose two.)
Options
Q: 3
Refer to the exhibit.
To allow access, which web tiller configuration must you change on FortiSASE?
To allow access, which web tiller configuration must you change on FortiSASE?Options
Q: 4
A customer needs to implement device posture checks for their remote endpoints while accessing
the protected server. They also want the TCP traffic between the remote endpoints and the
protected servers to be processed by FortiGate.
In this scenario, which three setups will achieve the above requirements? (Choose three.)
Options
Q: 5
Refer to the exhibits.
A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The tunnel is
up to the FortiGale hub. However, the administrator is not able to ping the webserver hosted behind
the FortiGate hub.
Based on the output, what is the reason for the ping failures?
A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The tunnel is
up to the FortiGale hub. However, the administrator is not able to ping the webserver hosted behind
the FortiGate hub.
Based on the output, what is the reason for the ping failures?Options
Q: 6
Which FortiSASE feature ensures least-privileged user access to all applications?
Options
Q: 7
Refer to the exhibit.
The daily report for application usage shows an unusually high number of unknown applications by
category.
What are two possible explanations for this? (Choose two.)
The daily report for application usage shows an unusually high number of unknown applications by
category.
What are two possible explanations for this? (Choose two.)Options
Q: 8
Refer to the exhibits.
A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The VPN
tunnel does not establish
Based on the provided configuration, what configuration needs to be modified to bring the tunnel
up?
A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The VPN
tunnel does not establish
Based on the provided configuration, what configuration needs to be modified to bring the tunnel
up?Options
Q: 9
An organization must block user attempts to log in to non-company resources while using Microsoft
Office 365 to prevent users from accessing unapproved cloud resources.
Which FortiSASE feature can you implement to achieve this requirement?
Options
Q: 10
Which two additional components does FortiSASE use for application control to act as an inline-
CASB? (Choose two.)
Options
Question 1 of 10