Free FCSS_SASE_AD-24 Exam Braindumps (page: 2)

Page 1 of 12

Refer to the exhibits.







A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org. Traffic logs show traffic is allowed by the policy.
Which configuration on FortiSASE is allowing users to perform the download?

  1. Web filter is allowing the traffic.
  2. IPS is disabled in the security profile group.
  3. The HTTPS protocol is not enabled in the antivirus profile.
  4. Force certificate inspection is enabled in the policy.

Answer(s): D

Explanation:

https://community.fortinet.com/t5/FortiSASE/Technical-Tip-Force-Certificate-Inspection-option-in- FortiSASE/ta-p/302617



An organization wants to block all video and audio application traffic but grant access to videos from CNN Which application override action must you configure in the Application Control with Inline- CASB?

  1. Allow
  2. Pass
  3. Permit
  4. Exempt

Answer(s): A

Explanation:

(https://docs.fortinet.com/document/fortisase/24.4.75/sia-agent-based-deployment- guide/568255/configuring-application-control-profile



Refer to the exhibits.





When remote users connected to FortiSASE require access to internal resources on Branch-2. how will traffic be routed?

  1. FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2.
    which will then route traffic to Branch-2.
  2. FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a static route
  3. FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1, which will then route traffic to Branch-2.
  4. FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route

Answer(s): D



What are two advantages of using zero-trust tags? (Choose two.)

  1. Zero-trust tags can be used to allow or deny access to network resources
  2. Zero-trust tags can determine the security posture of an endpoint.
  3. Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints
  4. Zero-trust tags can be used to allow secure web gateway (SWG) access

Answer(s): A,B

Explanation:

Zero-trust tags are critical in implementing zero-trust network access (ZTNA) policies. Here are the two key advantages of using zero-trust tags:
Access Control (Allow or Deny):
Zero-trust tags can be used to define policies that either allow or deny access to specific network resources based on the tag associated with the user or device. This granular control ensures that only authorized users or devices with the appropriate tags can access sensitive resources, thereby enhancing security.
Determining Security Posture:
Zero-trust tags can be utilized to assess and determine the security posture of an endpoint. Based on the assigned tags, FortiSASE can evaluate the device's compliance with security policies, such as antivirus status, patch levels, and configuration settings. Devices that do not meet the required security posture can be restricted from accessing the network or given limited access.


Reference:

FortiOS 7.2 Administration Guide: Provides detailed information on configuring and using zero-trust tags for access control and security posture assessment. FortiSASE 23.2 Documentation: Explains how zero-trust tags are implemented and used within the FortiSASE environment for enhancing security and compliance.






Post your Comments and Discuss Fortinet FCSS_SASE_AD-24 exam with other Community members:

FCSS_SASE_AD-24 Exam Discussions & Posts