Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Fortinet FCSS_SASE_AD-24 Practice Exam with Questions & Answers

Questions 1

Refer to the exhibits.

FCSS_SASE_AD-24 Question 1

FCSS_SASE_AD-24 Question 1

FCSS_SASE_AD-24 Question 1

FCSS_SASE_AD-24 Question 1

FCSS_SASE_AD-24 Question 1

A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The VPN tunnel does not establish

Based on the provided configuration, what configuration needs to be modified to bring the tunnel up?

Options:
A.

NAT needs to be enabled in the Spoke-to-Hub firewall policy.

B.

The BGP router ID needs to match on the hub and FortiSASE.

C.

FortiSASE spoke devices do not support mode config.

D.

The hub needs IKEv2 enabled in the IPsec phase 1 settings.

Questions 2

Refer to the exhibit.

FCSS_SASE_AD-24 Question 2

A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.

Which configuration must you apply to achieve this requirement?

Options:
A.

Exempt the Google Maps FQDN from the endpoint system proxy settings.

B.

Configure a static route with the Google Maps FQDN on the endpoint to redirect traffic

C.

Configure the Google Maps FQDN as a split tunneling destination on the FortiSASE endpoint profile.

D.

Change the default DNS server configuration on FortiSASE to use the endpoint system DNS.

Questions 3

You are designing a new network for Company X and one of the new cybersecurity policy requirements is that all remote user endpoints must always be connected and protected Which FortiSASE component facilitates this always-on security measure?

Options:
A.

site-based deployment

B.

thin-branch SASE extension

C.

unified FortiClient

D.

inline-CASB

Questions 4

Your organization is currently using FortiSASE for its cybersecurity. They have recently hired a contractor who will work from the HQ office and who needs temporary internet access in order to set up a web-based point of sale (POS) system.

What is the recommended way to provide internet access to the contractor?

Options:
A.

Use FortiClient on the endpoint to manage internet access.

B.

Use a proxy auto-configuration (PAC) file and provide secure web gateway (SWG) service as an explicit web proxy.

C.

Use zero trust network access (ZTNA) and tag the client as an unmanaged endpoint.

D.

Configure a VPN policy on FortiSASE to provide access to the internet.

Questions 5

How does FortiSASE hide user information when viewing and analyzing logs?

Options:
A.

By hashing data using Blowfish

B.

By hashing data using salt

C.

By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)

D.

By encrypting data using advanced encryption standard (AES)

Questions 6

Which two deployment methods are used to connect a FortiExtender as a FortiSASE LAN extension? (Choose two.)

Options:
A.

Connect FortiExtender to FortiSASE using FortiZTP

B.

Enable Control and Provisioning Wireless Access Points (CAPWAP) access on the FortiSASE portal.

C.

Enter the FortiSASE domain name in the FortiExtender GUI as a static discovery server

D.

Configure an IPsec tunnel on FortiSASE to connect to FortiExtender.

Questions 7

Which statement best describes the Digital Experience Monitor (DEM) feature on FortiSASE?

Options:
A.

It provides end-to-end network visibility from all the FortiSASE security PoPs to a specific SaaS application.

B.

It can be used to request a detailed analysis of the endpoint from the FortiGuard team.

C.

It requires a separate DEM agent to be downloaded from the FortiSASE portal and installed on the endpoint.

D.

It can help IT and security teams ensure consistent security monitoring for remote users.

Questions 8

Which two statements describe a zero trust network access (ZTNA) private access use case? (Choose two.)

Options:
A.

The security posture of the device is secure.

B.

All FortiSASE user-based deployments are supported.

C.

All TCP-based applications are supported.

D.

Data center redundancy is offered.

Questions 9

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.

In this scenario, which three setups will achieve the above requirements? (Choose three.)

Options:
A.

Configure ZTNA servers and ZTNA policies on FortiGate.

B.

Configure private access policies on FortiSASE with ZTNA.

C.

Configure ZTNA tags on FortiGate.

D.

Configure FortiGate as a zero trust network access (ZTNA) access proxy.

E.

Sync ZTNA tags from FortiSASE to FortiGate.

Questions 10

Refer to the exhibits.

FCSS_SASE_AD-24 Question 10

FCSS_SASE_AD-24 Question 10

When remote users connected to FortiSASE require access to internal resources on Branch-2. how will traffic be routed?

Options:
A.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2. which will then route traffic to Branch-2.

B.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a static route

C.

FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1, which will then route traffic to Branch-2.

D.

FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route

Exam Code: FCSS_SASE_AD-24
Certification Provider: Fortinet
Exam Name: FCSS - FortiSASE 24 Administrator
Last Update: Jul 11, 2025
Questions: 44
PDF + Testing Engine
$164.99
$66
Testing Engine
$124.99
$50
PDF (Q&A)
$104.99
$42

Fortinet Free Exams

Fortinet Free Exams
Access free Fortinet exam study guides and practice tests at Examstrack. Ensure your success with top-notch preparation resources at Examstrack.