Pass the Fortinet Fortinet Certified Solution Specialist FCSS_SASE_AD-25 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Refer to the exhibits.

Question # 11

Question # 11

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download theeicar.com-zipfile fromhttps://eicar.org.

Which configuration on FortiSASE is allowing users to perform the download?

A- Web filter is allowing the URL.

B. Deep inspection is not enabled.

C. Application control is exempting all the browser traffic.

D. Intrusion prevention is disabled.


Expert Solution
Questions # 12:

Refer to the exhibit.

Question # 12

The daily report for application usage for internet traffic shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

Options:

A.

Certificate inspection is not being used to scan application traffic.


B.

Deep inspection is not being used to scan traffic.


C.

The private access policy must be to set to log Security Events.


D.

The inline-CASB application control profile does not have application categories set to Monitor.


Expert Solution
Questions # 13:

How do security profile group objects behave when central management is enabled on FortiSASE?

Options:

A.

Objects support two-way synchronization.


B.

Objects created on FortiSASE can be retrieved on FortiManager.


C.

Objects that are only flow-based are supported.


D.

Objects are considered read-only on FortiSASE.


Expert Solution
Questions # 14:

Which statement best describes the Digital Experience Monitor (DEM) feature on FortiSASE?

Options:

A.

It provides end-to-end network visibility from all the FortiSASE security PoPs to a specific SaaS application.


B.

It gathers all the vulnerability information from all the FortiClient endpoints.


C.

It is used for performing device compliance checks on endpoints.


D.

It monitors the FortiSASE POP health based on ping probes.


Expert Solution
Questions # 15:

A company must provide access to a web server through FortiSASE secure private access for contractors.

What is the recommended method to provide access?

Options:

A.

Configure a TCP access proxy forwarding rule and push it to the contractor FortiClient endpoint.


B.

Update the DNS records on the endpoint to access private applications.


C.

Publish the web server URL on a bookmark portal and share it with contractors.


D.

Update the PAC file with the web server URL and share it with contractors.


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions