Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 2
Total 13 questions
Exam Code: FCSS_SASE_AD-24                Update: Oct 15, 2025
Exam Name: FCSS - FortiSASE 24 Administrator

Fortinet FCSS - FortiSASE 24 Administrator FCSS_SASE_AD-24 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

During FortiSASE provisioning, how many security points of presence (POPs) need to be configured by the FortiSASE administrator?

A.

3

B.

4

C.

2

D.

1

Question # 2

Which two statements describe a zero trust network access (ZTNA) private access use case? (Choose two.)

A.

The security posture of the device is secure.

B.

All FortiSASE user-based deployments are supported.

C.

All TCP-based applications are supported.

D.

Data center redundancy is offered.

Question # 3

When viewing the daily summary report generated by FortiSASE, the administrator notices that the report contains very little data.

What is a possible explanation for this almost empty report?

A.

Log allowed traffic is set to Security Events for all policies.

B.

There are no security profile groups applied to all policies.

C.

The web filter security profile is not set to Monitor.

D.

Digital experience monitoring is not configured.

Question # 4

Refer to the exhibit.

A company has a requirement to inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical Interface.

Which configuration must you apply to achieve this requirement?

A.

Exempt the Google Maps FQDN from the endpoint system proxy settings.

B.

Configure a static route with the Google Maps FQDN on the endpoint to redirect traffic

C.

Configure the Google Maps FQDN as a split tunneling destination on the FortiSASE endpoint profile.

D.

Change the default DNS server configuration on FortiSASE to use the endpoint system DNS.

Question # 5

Refer to the exhibit.

The daily report for application usage shows an unusually high number of unknown applications by category.

What are two possible explanations for this? (Choose two.)

A.

Certificate inspection is not being used to scan application traffic.

B.

The inline-CASB application control profile does not have application categories set to Monitor

C.

Zero trust network access (ZTNA) tags are not being used to tag the correct users.

D.

Deep inspection is not being used to scan traffic.

Question # 6

What are two advantages of using zero-trust tags? (Choose two.)

A.

Zero-trust tags can be used to allow or deny access to network resources

B.

Zero-trust tags can determine the security posture of an endpoint.

C.

Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints

D.

Zero-trust tags can be used to allow secure web gateway (SWG) access

Question # 7

Which event log subtype captures FortiSASE SSL VPN user creation?

A.

Endpoint Events

B.

VPN Events

C.

User Events

D.

Administrator Events

Question # 8

When accessing the FortiSASE portal for the first time, an administrator must select data center locations for which three FortiSASE components? (Choose three.)

A.

Endpoint management

B.

Points of presence

C.

SD-WAN hub

D.

Logging

E.

Authentication

Question # 9

How does FortiSASE hide user information when viewing and analyzing logs?

A.

By hashing data using Blowfish

B.

By hashing data using salt

C.

By encrypting data using Secure Hash Algorithm 256-bit (SHA-256)

D.

By encrypting data using advanced encryption standard (AES)

Question # 10

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.

In this scenario, which three setups will achieve the above requirements? (Choose three.)

A.

Configure ZTNA servers and ZTNA policies on FortiGate.

B.

Configure private access policies on FortiSASE with ZTNA.

C.

Configure ZTNA tags on FortiGate.

D.

Configure FortiGate as a zero trust network access (ZTNA) access proxy.

E.

Sync ZTNA tags from FortiSASE to FortiGate.

Page: 1 / 2
Total 13 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025