Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

FCSS_SASE_AD-24 FCSS - FortiSASE 24 Administrator Questions and Answers

Questions 4

Which two components are part of onboarding a secure web gateway (SWG) endpoint? (Choose two)

Options:

A.

FortiSASE CA certificate

B.

proxy auto-configuration (PAC) file

C.

FortiSASE invitation code

D.

FortiClient installer

Buy Now
Questions 5

An organization must block user attempts to log in to non-company resources while using Microsoft Office 365 to prevent users from accessing unapproved cloud resources.

Which FortiSASE feature can you implement to achieve this requirement?

Options:

A.

Web Filter with Inline-CASB

B.

SSL deep inspection

C.

Data loss prevention (DLP)

D.

Application Control with Inline-CASB

Buy Now
Questions 6

How does FortiSASE hide user information when viewing and analyzing logs?

Options:

A.

By hashing data using Blowfish

B.

By hashing data using salt

C.

By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)

D.

By encrypting data using advanced encryption standard (AES)

Buy Now
Questions 7

Your organization is currently using FortiSASE for its cybersecurity. They have recently hired a contractor who will work from the HQ office and who needs temporary internet access in order to set up a web-based point of sale (POS) system.

What is the recommended way to provide internet access to the contractor?

Options:

A.

Use FortiClient on the endpoint to manage internet access.

B.

Use a proxy auto-configuration (PAC) file and provide secure web gateway (SWG) service as an explicit web proxy.

C.

Use zero trust network access (ZTNA) and tag the client as an unmanaged endpoint.

D.

Configure a VPN policy on FortiSASE to provide access to the internet.

Buy Now
Questions 8

Which three configurations must you perform to set up FortiGate as a FortiSASE LAN extension? (Choose three.)

Options:

A.

Connect FortiGate to FortiSASE using FortiZTP.

B.

Enter the FortiSASE domain name in the FortiGate GUI as the access controller address.

C.

Configure VXLAN-over-IPsecon the FortiSASE portal

D.

Create a LAN extension VDOM on the edge FortiGate

E.

Authorize the edge FortiGate device on FortiSASE portal.

Buy Now
Questions 9

Refer to the exhibit.

FCSS_SASE_AD-24 Question 9

A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.

Which configuration must you apply to achieve this requirement?

Options:

A.

Exempt the Google Maps FQDN from the endpoint system proxy settings.

B.

Configure a static route with the Google Maps FQDN on the endpoint to redirect traffic

C.

Configure the Google Maps FQDN as a split tunneling destination on the FortiSASE endpoint profile.

D.

Change the default DNS server configuration on FortiSASE to use the endpoint system DNS.

Buy Now
Questions 10

A FortiSASE administrator is configuring a Secure Private Access (SPA) solution to share endpoint information with a corporate FortiGate.

Which three configuration actions will achieve this solution? (Choose three.)

Options:

A.

Add the FortiGate IP address in the secure private access configuration on FortiSASE.

B.

Use the FortiClient EMS cloud connector on the corporate FortiGate to connect to FortiSASE

C.

Register FortiGate and FortiSASE under the same FortiCloud account.

D.

Authorize the corporate FortiGate on FortiSASE as a ZTNA access proxy.

E.

Apply the FortiSASE zero trust network access (ZTNA) license on the corporate FortiGate.

Buy Now
Questions 11

Refer to the exhibit.

FCSS_SASE_AD-24 Question 11

The daily report for application usage shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

Options:

A.

Certificate inspection is not being used to scan application traffic.

B.

The inline-CASB application control profile does not have application categories set to Monitor

C.

Zero trust network access (ZTNA) tags are not being used to tag the correct users.

D.

Deep inspection is not being used to scan traffic.

Buy Now
Questions 12

In which three ways does FortiSASE help organizations ensure secure access for remote workers? (Choose three.)

Options:

A.

It enforces multi-factor authentication (MFA) to validate remote users.

B.

It secures traffic from endpoints to cloud applications.

C.

It uses the identity & access management (IAM) portal to validate the identities of remote workers.

D.

It offers zero trust network access (ZTNA) capabilities.

E.

It enforces granular access policies based on user identities.

Buy Now
Questions 13

In a FortiSASE secure web gateway (SWG) deployment, which three features protect against web-based threats? (Choose three J

Options:

A.

Intrusion prevention system (IPS) for web traffic

B.

SSL deep inspection for encrypted web traffic

C.

Malware protection with sandboxing capabilities

D.

Data loss prevention (DLP) for web traffic

E.

Web application firewall (WAF) for web applications

Buy Now
Questions 14

Which of the following describes the FortiSASE inline-CASB component?

Options:

A.

It provides visibility for unmanaged locations and devices.

B.

It is placed directly in the traffic path between the endpoint and cloud applications.

C.

It uses API to connect to the cloud applications.

D.

It detects data at rest.

Buy Now
Questions 15

What are two advantages of using zero-trust tags? (Choose two.)

Options:

A.

Zero-trust tags can be used to allow or deny access to network resources

B.

Zero-trust tags can determine the security posture of an endpoint.

C.

Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints

D.

Zero-trust tags can be used to allow secure web gateway (SWG) access

Buy Now
Questions 16

Which two statements describe a zero trust network access (ZTNA) private access use case? (Choose two.)

Options:

A.

The security posture of the device is secure.

B.

All FortiSASE user-based deployments are supported.

C.

All TCP-based applications are supported.

D.

Data center redundancy is offered.

Buy Now
Exam Code: FCSS_SASE_AD-24
Exam Name: FCSS - FortiSASE 24 Administrator
Last Update: Oct 2, 2025
Questions: 54

PDF + Testing Engine

$72.6  $181.49

Testing Engine

$57.8  $144.49
buy now FCSS_SASE_AD-24 testing engine

PDF (Q&A)

$49.8  $124.49
buy now FCSS_SASE_AD-24 pdf