FCSS_SASE_AD-23 FCSS – FortiSASE 23 Administrator Exam

Description
The FCSS in Secure Access Service Edge (SASE) certification validates your ability to design, administer, monitor, and troubleshoot Fortinet SASE solutions. This curriculum covers SASE infrastructures using advanced Fortinet solutions.
Who Should Attempt the FCSS in SASE Certification?

We recommend this certification for cybersecurity professionals who require the expertise needed to design, manage, support, and analyze advanced Fortinet SASE solutions.

Program Requirements
To achieve this certification, you are required to pass two core exams within two years.

Core Exams
FCSS – FortiSASE Administrator
NSE 7 SD-WAN

Elective Exams : N/A

To prepare for the certification exams, we recommend that you take the associated NSE courses.

Digital Badges
You will receive digital badges under the following circumstances:

Exam badge: Each time you pass any version of the exam included in FCSS – SASE.
Certification badge: Once you achieve the requirements for the FCSS – SASE certification.

For more information, see the following knowledge base article in the Fortinet Training Institute Helpdesk.


About the FCSS in Secure Access Service Edge Exams
Fortinet NSE 7—SD-WAN 7.2

Exam series: NSE7_SDW-7.2
Number of questions: 40
Exam time: 75 minutes
Language: English, Japanese
Product version: FortiOS 7.2.4, FortiManager 7.2.2, FortiAnalyzer 7.2.2
Status: Available
Exam details: exam description
Fortinet NSE 7—SD-WAN 7.2
FCSS—FortiSASE 23 Administrator
Exam series: FCSS_SASE_AD-23
Number of questions: 30
Exam time: 60 minutes
Language: English
Product version: FortiSASE 23.2, FortiOS 7.2, FortiClient 7.0, FortiAuthenticator 6.5
Status: Available
Exam details: exam description

Examkingdom Fortinet FCSS_SASE_AD-23 Exam pdf

Fortinet FCSS_SASE_AD-23

Best Fortinet FCSS_SASE_AD-23 Downloads, Fortinet FCSS_SASE_AD-23 Dumps at Certkingdom.com

Certification
This exam is in the Fortinet Certified Solution Specalist – Secure Access Service Edge certification track. This certification
validates your ability to design, administer, monitor, and troubleshoot Fortinet SASE solutions.
Visit the Cybersecurity Certification page for information about certification requirements.

Exam
The FCSS—FortiSASE 23 Administrator exam evaluates your knowledge of, and expertise with, the FortiSASE solution.
The exam tests your applied knowledge of FortiSASE configuration and operation, and includes operational scenarios, incident
analysis, integration with supported products, and troubleshooting scenarios.
Once you pass the exam, you will receive the following exam badge

Exam Details
Exam name FCSS—FortiSASE 23 Administrator
Exam series FCSS_SASE_AD-23
Time allowed 60 minutes
Exam questions 30 multiple-choice questions
Scoring Pass or fail. A score report is available from your Pearson VUE account.
Language English
Product version FortiSASE 23.2, FortiOS 7.2, FortiClient 7.0, FortiAuthenticator 6.5

Exam Topics
Successful candidates have applied knowledge and skills in the following areas and tasks:

* SASE architecture and components
* Integrate FortiSASE in a hybrid network
* Identify FortiSASE components
* Construct FortiSASE deployment cases
* SASE deployment
* Implement various types of user onboarding methods
* Configure SASE administration settings
* Configure and apply security posture checks and compliance rules
* SIA, SSA, and SPA
* Design security profiles to perform content inspection
* Deploy SD-WAN using FortiSASE
* Deploy ZTNA
* Analytics
* Identify potentia* security threats using FortiSASE logs
* Configure dashboards, FortiView and logging settings
* Analyze reports for user traffic and security issues

Training Resources
The following resources are recommended for attaining the knowledge and skills that are covered on the exam. The
recommended training is available as a foundation for exam preparation. In addition to training, you are strongly encouraged to
have hands-on experience with the exam topics and objectives.

* FCSS – FortiSASE 23 Administrator course and hands-on labs
* FortiSASE—Administration Guide
* FortiSASE—Reference Guide
* FortiSASE—Architecture Guide
* FortiSASE—SIA Agent-based Deployment Guide
* FortiSASE—SIA Site-based Deployment Guide
* FortiSASE—SIA Agentless SWG Deployment Guide
* FortiSASE—SSA Inline-CASB Deployment
* FortiSASE—SPA Using ZTNA Deployment Guide

Experience

* 2 years of experience with networking
* 2 years of experience with network security
* 2 years of experience with endpoint management
* 1 year of experience with hybrid networks

Exam Sample Questions

QUESTION 1
Refer to the exhibits

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied
it to the internet access policy. Remote users are still able to download the eicar.com-zip file from
https://eicar.org. Traffic logs show traffic is allowed by the policy.
Which configuration on FortiSASE is allowing users to perform the download?

A. Web filter is allowing the traffic.
B. IPS is disabled in the security profile group.
C. The HTTPS protocol is not enabled in the antivirus profile.
D. Force certificate inspection is enabled in the policy.

Answer: A

Explanation:
Based on the provided exhibits and the configuration details, the reason why users are still able to
download the eicar.com-zip file despite having an antivirus profile applied is due to the Web Filter
allowing the traffic. Here is the step-by-step detailed explanation:
Web Filtering Logs Analysis:
The logs show that the traffic to the destination port 443 (which is HTTPS) is allowed and the security
event triggered is Web Filter.
The log details indicate that the URL belongs to an allowed category in the policy and thus, the traffic
is permitted by the Web Filter.
Security Profile Group Configuration:
The Web Filter with Inline-CASB section indicates that the site www.eicar.org is being monitored (93
occurrences) and not blocked.
Since the Web Filter is set to allow traffic from this site, the antivirus profile will not block it because
the Web Filter decision takes precedence.
Antivirus Profile Configuration:
Although the antivirus profile is configured, the logs do not show any antivirus actions being
triggered. This indicates that the web filter is overriding the antivirus action.
Policy Configuration:
The policy named “Web Traffic” shows that it has logging enabled and is set to accept traffic.
The profile group “SIA” applied to this policy includes both Web Filter and Antivirus settings.
However, since the Web Filter is allowing the traffic, the antivirus profile does not get the chance to inspect it.
Reference:
FortiGate Security 7.2 Study Guide: Provides details on the precedence of web filtering over antivirus in security profiles.
Fortinet Knowledge Base: Detailed explanation of web filtering and antivirus profiles interaction.

QUESTION 2
An organization wants to block all video and audio application traffic but grant access to videos from
CNN Which application override action must you configure in the Application Control with Inline-CASB?

A. Allow
B. Pass
C. Permit
D. Exempt

Answer: D

Explanation:
To block all video and audio application traffic while granting access to videos from CNN, you need to
configure an application override action in the Application Control with Inline-CASB. Here is the stepbystep detailed explanation:
Application Control Configuration:
Application Control is used to identify and manage application traffic based on predefined or custom application signatures.
Inline-CASB (Cloud Access Security Broker) extends these capabilities by allowing more granular control over cloud applications.
Blocking Video and Audio Applications:
To block all video and audio application traffic, you can create a policy within Application Control to
deny all categories related to video and audio streaming.
Granting Access to Specific Videos (CNN):
To allow access to videos from CNN specifically, you must create an override rule within the same Application Control profile.
The override action “Exempt” ensures that traffic to specified URLs (such as those from CNN) is not subjected to the blocking rules set for other video and audio traffic.

Configuration Steps:
Navigate to the Application Control profile in the FortiSASE interface.
Set the application categories related to video and audio streaming to “Block.”
Add a new override entry for CNN video traffic and set the action to “Exempt.”

Reference:
FortiOS 7.2 Administration Guide: Detailed steps on configuring Application Control and Inline-CASB.
Fortinet Training Institute: Provides scenarios and examples of using Application Control with Inline-
CASB for specific use cases.

QUESTION 3
Refer to the exhibits.
When remote users connected to FortiSASE require access to internal resources on Branch-2. how
will traffic be routed?

A. FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-2. which will then route traffic to Branch-2.
B. FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a static route
C. FortiSASE will use the SD-WAN capability and determine that traffic will be directed to HUB-1, which will then route traffic to Branch-2.
D. FortiSASE will use the AD VPN protocol and determine that traffic will be directed to Branch-2 directly, using a dynamic route

Answer: C

Explanation:
When remote users connected to FortiSASE require access to internal resources on Branch-2, the following process occurs:
SD-WAN Capability:
FortiSASE leverages SD-WAN to optimize traffic routing based on performance metrics and priorities.
In the priority settings, HUB-1 is configured with the highest priority (P1), whereas HUB-2 has a lower priority (P2).
Traffic Routing Decision:
FortiSASE evaluates the available hubs (HUB-1 and HUB-2) and selects HUB-1 due to its highest priority setting.
Once the traffic reaches HUB-1, it is then routed to the appropriate branch based on internal routing policies.
Branch-2 Access:
Since HUB-1 has the highest priority, FortiSASE directs the traffic to HUB-1.
HUB-1 then routes the traffic to Branch-2, providing the remote users access to the internal resources.
Reference:
FortiOS 7.2 Administration Guide: Details on SD-WAN configurations and priority settings.
FortiSASE 23.2 Documentation: Explains how FortiSASE integrates with SD-WAN to route traffic
based on defined priorities and performance metrics.

QUESTION 4
What are two advantages of using zero-trust tags? (Choose two.)

A. Zero-trust tags can be used to allow or deny access to network resources
B. Zero-trust tags can determine the security posture of an endpoint.
C. Zero-trust tags can be used to create multiple endpoint profiles which can be applied to different endpoints
D. Zero-trust tags can be used to allow secure web gateway (SWG) access

Answer: AB

Explanation:
Zero-trust tags are critical in implementing zero-trust network access (ZTNA) policies. Here are the
two key advantages of using zero-trust tags:
Access Control (Allow or Deny):
Zero-trust tags can be used to define policies that either allow or deny access to specific network
resources based on the tag associated with the user or device.
This granular control ensures that only authorized users or devices with the appropriate tags can
access sensitive resources, thereby enhancing security.
Determining Security Posture:
Zero-trust tags can be utilized to assess and determine the security posture of an endpoint.
Based on the assigned tags, FortiSASE can evaluate the device’s compliance with security policies,
such as antivirus status, patch levels, and configuration settings.
Devices that do not meet the required security posture can be restricted from accessing the network or given limited access.

Reference:
FortiOS 7.2 Administration Guide: Provides detailed information on configuring and using zero-trust
tags for access control and security posture assessment.
FortiSASE 23.2 Documentation: Explains how zero-trust tags are implemented and used within the
FortiSASE environment for enhancing security and compliance.

Click to rate this post!
[Total: 0 Average: 0]

Leave a comment

(*) Required, Your email will not be published