SASE definitivo Flashcards
(60 cards)
A FortiSASE administrator has configured an antivirus profile in the security profile group and applied
it to the internet access policy. Remote users are still able to download the eicar.com-zip file from
https://eicar.org. Traffic logs show traffic is allowed by the policy.
Which configuration on FortiSASE is allowing users to perform the download?A. Web filter is allowing the traffic.
B. IPS is disabled in the security profile group.
C. The HTTPS protocol is not enabled in the antivirus profile.
D. Force certificate inspection is enabled in the policy.
D
An organization wants to block all video and audio application traffic but grant access to videos from
CNN Which application override action must you configure in the Application Control with Inline-
CASB?
A. Allow
B. Pass
C. Permit
D. Exempt
A
When remote users connected to FortiSASE require access to internal resources on Branch-2. how
will traffic be routed?
A. FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2.
which will then route traffic to Branch-2.
B. FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2
directly, using a static route
C. FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1,
which will then route traffic to Branch-2.D. FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route
D
What are two advantages of using zero-trust tags? (Choose two.)
A. Zero-trust tags can be used to allow or deny access to network resources
B. Zero-trust tags can determine the security posture of an endpoint.
C. Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints
D. Zero-trust tags can be used to allow secure web gateway (SWG) access
A, B
In the user connection monitor, the FortiSASE administrator notices the user name is showing
random characters. Which configuration change must the administrator make to get proper user
information?
A. Turn off log anonymization on FortiSASE.
B. Add more endpoint licenses on FortiSASE.
C. Configure the username using FortiSASE naming convention.
D. Change the deployment type from SWG to VPN.
A
To allow access, which web tiller configuration must you change on FortiSASE?
A. FortiGuard category-based filter
B. content filter
C. URL Filter
D. inline cloud access security broker (CASB) headers
B
Which policy type is used to control traffic between the FortiClient endpoint to FortiSASE for secure
internet access?
A. VPN policy
B. thin edge policy
C. private access policy
D. secure web gateway (SWG) policy
A
Which role does FortiSASE play in supporting zero trust network access (ZTNA) principles9
A. It offers hardware-based firewalls for network segmentation.
B. It integrates with software-defined network (SDN) solutions.
C. It can identify attributes on the endpoint for security posture check.
D. It enables VPN connections for remote employees.
C
When deploying FortiSASE agent-based clients, which three features are available compared to an
agentless solution? (Choose three.)
A. Vulnerability scan
B. SSL inspection
C. Anti-ransomware protection
D. Web filter
E. ZTNA tags
A, C, E
Which FortiSASE feature ensures least-privileged user access to all applications?
A. secure web gateway (SWG)
B. SD-WAN
C. zero trust network access (ZTNA)
D. thin branch SASE extension
C
Which two components are part of onboarding a secure web gateway (SWG) endpoint? (Choose two)
A. FortiSASE CA certificate
B. proxy auto-configuration (PAC) file
C. FortiSASE invitation code
D. FortiClient installer
A, B
Which two deployment methods are used to connect a FortiExtender as a FortiSASE LAN extension?
(Choose two.)
A. Connect FortiExtender to FortiSASE using FortiZTP
B. Enable Control and Provisioning Wireless Access Points (CAPWAP) access on the FortiSASE portal.
C. Enter the FortiSASE domain name in the FortiExtender GUI as a static discovery server
D. Configure an IPsec tunnel on FortiSASE to connect to FortiExtender.
A, C
How does FortiSASE hide user information when viewing and analyzing logs?
A. By hashing data using Blowfish
B. By hashing data using salt
C. By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)
D. By encrypting data using advanced encryption standard (AES)
B
A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude
Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.
Which configuration must you apply to achieve this requirement?
A. Exempt the Google Maps FQDN from the endpoint system proxy settings.
B. Configure a static route with the Google Maps FQDN on the endpoint to redirect traffic
C. Configure the Google Maps FQDN as a split tunneling destination on the FortiSASE endpoint
profile.
D. Change the default DNS server configuration on FortiSASE to use the endpoint system DNS.
C
WiMO-Pro and Win7-Pro are endpoints from the same remote location. WiMO-Pro can access the
internet though FortiSASE, while Wm7-Pro can no longer access the internet
Given the exhibits, which reason explains the outage on Wm7-Pro?
A. The Win7-Pro device posture has changed.
B. Win7-Pro cannot reach the FortiSASE SSL VPN gateway
C. The Win7-Pro FortiClient version does not match the FortiSASE endpoint requirement.
D. Win-7 Pro has exceeded the total vulnerability detected threshold.
A
A customer wants to upgrade their legacy on-premises proxy to a could-based proxy for a hybrid
network. Which FortiSASE features would help the customer to achieve this outcome?
A. SD-WAN and NGFW
B. SD-WAN and inline-CASB
C. zero trust network access (ZTNA) and next generation firewall (NGFW)
D. secure web gateway (SWG) and inline-CASB
D
When you configure FortiSASE Secure Private Access (SPA) with SD-WAN integration, you must
establish a routing adjacency between FortiSASE and the FortiGate SD-WAN hub. Which routing
protocol must you use?
A. BGP
B. IS-IS
C. OSPF
D. EIGRP
A
A FortiSASE administrator is configuring a Secure Private Access (SPA) solution to share endpoint
information with a corporate FortiGate.
Which three configuration actions will achieve this solution? (Choose three.)
A. Add the FortiGate IP address in the secure private access configuration on FortiSASE.
B. Use the FortiClient EMS cloud connector on the corporate FortiGate to connect to FortiSASE
C. Register FortiGate and FortiSASE under the same FortiCloud account.
D. Authorize the corporate FortiGate on FortiSASE as a ZTNA access proxy.
E. Apply the FortiSASE zero trust network access (ZTNA) license on the corporate FortiGate.
B, C, D
The daily report for application usage shows an unusually high number of unknown applications by
category.
What are two possible explanations for this? (Choose two.)
A. Certificate inspection is not being used to scan application traffic.
B. The inline-CASB application control profile does not have application categories set to Monitor
C. Zero trust network access (ZTNA) tags are not being used to tag the correct users.
D. Deep inspection is not being used to scan traffic.
B, D
When viewing the daily summary report generated by FortiSASE. the administrator notices that the
report contains very little dat
What is a possible explanation for this almost empty report?
A. Digital experience monitoring is not configured.
B. Log allowed traffic is set to Security Events for all policies.
C. The web filter security profile is not set to Monitor
D. There are no security profile group applied to all policies.
B
You are designing a new network for Company X and one of the new cybersecurity policy
requirements is that all remote user endpoints must always be connected and protected Which
FortiSASE component facilitates this always-on security measure?
A. site-based deployment
B. thin-branch SASE extension
C. unified FortiClient
D. inline-CASB
C
A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The tunnel is
up to the FortiGale hub. However, the administrator is not able to ping the webserver hosted behind
the FortiGate hub.
Based on the output, what is the reason for the ping failures?A. The Secure Private Access (SPA) policy needs to allow PING service.
B. Quick mode selectors are restricting the subnet.
C. The BGP route is not received.
D. Network address translation (NAT) is not enabled on the spoke-to-hub policy.
C
To complete their day-to-day operations, remote users require access to a TCP-based application that
is hosted on a private web server. Which FortiSASE deployment use case provides the most efficient
and secure method for meeting the remote users’ requirements?
A. SD-WAN private access
B. inline-CASB
C. zero trust network access (ZTNA) private access
D. next generation firewall (NGFW)
C
Which secure internet access (SIA) use case minimizes individual workstation or device setup,
because you do not need to install FortiClient on endpoints or configure explicit web proxy settings
on web browser-based end points?
A. SIA for inline-CASB users
B. SIA for agentless remote users
C. SIA for SSLVPN remote users
D. SIA for site-based remote users
D