Fortinet FCSS_SASE_AD-23 Exam (page: 2)
Fortinet FCSS - FortiSASE 23 Administrator
Updated on: 12-Feb-2026

Viewing Page 2 of 7

Refer to the exhibit.



To allow access, which web tiller configuration must you change on FortiSASE?

  1. FortiGuard category-based filter
  2. content filter
  3. URL Filter
  4. inline cloud access security broker (CASB) headers

Answer(s): C

Explanation:

The exhibit indicates that the URL https://www.bbc.com/ is being blocked due to containing a banned word ("fight"). To allow access to this specific URL, you need to adjust the URL filter settings on FortiSASE.
URL Filtering:
URL filtering allows administrators to define policies that block or allow access to specific URLs or URL patterns.
In this case, the URL filter is set to block any URL containing the word "fight." Modifying URL Filter:
Navigate to the Web Filter configuration in FortiSASE.
Locate the URL filter settings.
Add an exception for the URL https://www.bbc.com/ to allow access, even if it contains a banned word.
Alternatively, remove or adjust the banned word list to exclude the word "fight" if it's not critical to the security policy.


Reference:

FortiOS 7.2 Administration Guide: Provides details on configuring and managing URL filters. FortiSASE 23.2 Documentation: Explains how to set up and modify web filtering policies, including URL filters.



Which policy type is used to control traffic between the FortiClient endpoint to FortiSASE for secure internet access?

  1. VPN policy
  2. thin edge policy
  3. private access policy
  4. secure web gateway (SWG) policy

Answer(s): D

Explanation:

The Secure Web Gateway (SWG) policy is used to control traffic between the FortiClient endpoint and FortiSASE for secure internet access. SWG provides comprehensive web security by enforcing policies that manage and monitor user access to the internet.
Secure Web Gateway (SWG) Policy:

SWG policies are designed to protect users from web-based threats and enforce acceptable use policies.
These policies control and monitor user traffic to and from the internet, ensuring that security protocols are followed.
Traffic Control:
The SWG policy intercepts all web traffic, inspects it, and applies security rules before allowing or blocking access.
This policy type is crucial for providing secure internet access to users connecting through FortiSASE.


Reference:

FortiOS 7.2 Administration Guide: Details on configuring and managing SWG policies. FortiSASE 23.2 Documentation: Explains the role of SWG in securing internet access for endpoints.



Which role does FortiSASE play in supporting zero trust network access (ZTNA) principles9

  1. It offers hardware-based firewalls for network segmentation.
  2. It integrates with software-defined network (SDN) solutions.
  3. It can identify attributes on the endpoint for security posture check.
  4. It enables VPN connections for remote employees.

Answer(s): C

Explanation:

FortiSASE supports zero trust network access (ZTNA) principles by identifying attributes on the endpoint for security posture checks. ZTNA principles require continuous verification of user and device credentials, as well as their security posture, before granting access to network resources.
Security Posture Check:
FortiSASE can evaluate the security posture of endpoints by checking for compliance with security policies, such as antivirus status, patch levels, and configuration settings. This ensures that only compliant and secure devices are granted access to the network.
Zero Trust Network Access (ZTNA):
ZTNA is based on the principle of "never trust, always verify," which requires continuous assessment of user and device trustworthiness.
FortiSASE plays a crucial role in implementing ZTNA by performing these security posture checks and enforcing access control policies.


Reference:

FortiOS 7.2 Administration Guide: Provides information on ZTNA and endpoint security posture checks.
FortiSASE 23.2 Documentation: Details on how FortiSASE implements ZTNA principles.



When deploying FortiSASE agent-based clients, which three features are available compared to an agentless solution? (Choose three.)

  1. Vulnerability scan
  2. SSL inspection
  3. Anti-ransomware protection
  4. Web filter
  5. ZTNA tags

Answer(s): A,B,D

Explanation:

When deploying FortiSASE agent-based clients, several features are available that are not typically available with an agentless solution. These features enhance the security and management capabilities for endpoints.
Vulnerability Scan:

Agent-based clients can perform vulnerability scans on endpoints to identify and remediate security weaknesses.
This proactive approach helps to ensure that endpoints are secure and compliant with security policies.
SSL Inspection:
Agent-based clients can perform SSL inspection to decrypt and inspect encrypted traffic for threats. This feature is critical for detecting malicious activities hidden within SSL/TLS encrypted traffic.
Web Filter:
Web filtering is a key feature available with agent-based clients, allowing administrators to control and monitor web access.
This feature helps enforce acceptable use policies and protect users from web-based threats.


Reference:

FortiOS 7.2 Administration Guide: Explains the features and benefits of deploying agent-based clients.
FortiSASE 23.2 Documentation: Details the differences between agent-based and agentless solutions and the additional features provided by agent-based deployments.



Which FortiSASE feature ensures least-privileged user access to all applications?

  1. secure web gateway (SWG)
  2. SD-WAN
  3. zero trust network access (ZTNA)
  4. thin branch SASE extension

Answer(s): C

Explanation:

Zero Trust Network Access (ZTNA) is the FortiSASE feature that ensures least-privileged user access to all applications. ZTNA operates on the principle of "never trust, always verify," providing secure access based on the identity of users and devices, regardless of their location.
Zero Trust Network Access (ZTNA):
ZTNA ensures that only authenticated and authorized users and devices can access applications. It applies the principle of least privilege by granting access only to the resources required by the user, minimizing the potential for unauthorized access.

Implementation:
ZTNA continuously verifies user and device trustworthiness and enforces granular access control policies.
This approach enhances security by reducing the attack surface and limiting lateral movement within the network.


Reference:

FortiOS 7.2 Administration Guide: Provides detailed information on ZTNA and its role in ensuring least-privileged access.
FortiSASE 23.2 Documentation: Explains the implementation and benefits of ZTNA within the FortiSASE environment.



Viewing Page 2 of 7



Share your comments for Fortinet FCSS_SASE_AD-23 exam with other users:

Elie Abou Chrouch 12/11/2023 3:38:00 AM

question 182 - correct answer is d. ethernet frame length is 64 - 1518b. length of user data containing is that frame: 46 - 1500b.
Anonymous


Damien 9/23/2023 8:37:00 AM

i need this exam pls
Anonymous


Nani 9/10/2023 12:02:00 PM

its required for me, please make it enable to access. thanks
UNITED STATES


ethiopia 8/2/2023 2:18:00 AM

seems good..
ETHIOPIA


whoAreWeReally 12/19/2023 8:29:00 PM

took the test last week, i did have about 15 - 20 word for word from this site on the test. (only was able to cram 600 of the questions from this site so maybe more were there i didnt review) had 4 labs, bgp, lacp, vrf with tunnels and actually had to skip a lab due to time. lots of automation syntax questions.
EUROPEAN UNION


vs 9/2/2023 12:19:00 PM

no comments
Anonymous


john adenu 11/14/2023 11:02:00 AM

nice questions bring out the best in you.
Anonymous


Osman 11/21/2023 2:27:00 PM

really helpful
Anonymous


Edward 9/13/2023 5:27:00 PM

question #50 and question #81 are exactly the same questions, azure site recovery provides________for virtual machines. the first says that it is fault tolerance is the answer and second says disater recovery. from my research, it says it should be disaster recovery. can anybody explain to me why? thank you
CANADA


Monti 5/24/2023 11:14:00 PM

iam thankful for these exam dumps questions, i would not have passed without this exam dumps.
UNITED STATES


Anon 10/25/2023 10:48:00 PM

some of the answers seem to be inaccurate. q10 for example shouldnt it be an m custom column?
MALAYSIA


PeterPan 10/18/2023 10:22:00 AM

are the question real or fake?
Anonymous


CW 7/11/2023 3:19:00 PM

thank you for providing such assistance.
UNITED STATES


Mn8300 11/9/2023 8:53:00 AM

nice questions
Anonymous


Nico 4/23/2023 11:41:00 PM

my 3rd purcahse from this site. these exam dumps are helpful. very helpful.
ITALY


Chere 9/15/2023 4:21:00 AM

found it good
Anonymous


Thembelani 5/30/2023 2:47:00 AM

excellent material
Anonymous


vinesh phale 9/11/2023 2:51:00 AM

very helpfull
UNITED STATES


Bhagiii 11/4/2023 7:04:00 AM

well explained.
Anonymous


Rahul 8/8/2023 9:40:00 PM

i need the pdf, please.
CANADA


CW 7/11/2023 2:51:00 PM

a good source for exam preparation
UNITED STATES


Anchal 10/23/2023 4:01:00 PM

nice questions
INDIA


J Nunes 9/29/2023 8:19:00 AM

i need ielts general training audio guide questions
BRAZIL


Ananya 9/14/2023 5:16:00 AM

please make this content available
UNITED STATES


Swathi 6/4/2023 2:18:00 PM

content is good
Anonymous


Leo 7/29/2023 8:45:00 AM

latest dumps please
INDIA


Laolu 2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.
UNITED STATES


Zaynik 9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer
Anonymous


Massam 6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump
Anonymous


Anonymous 12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.
INDIA


Japles 5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.
Anonymous


Faritha 8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures
UNITED STATES


Anonymous 9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i
UNITED STATES


p das 12/7/2023 11:41:00 PM

very good questions
UNITED STATES