Fortinet FCSS_SASE_AD-25 Exam (page: 1)
Fortinet FCSS - FortiSASE 25 Administrator
Updated on: 11-Dec-2025

Viewing Page 1 of 8

In the Secure Private Access (SPA) use case, which two FortiSASE features facilitate access to corporate applications? (Choose two.)

  1. cloud access security broker (CASB)
  2. SD-WAN
  3. zero trust network access (ZTNA)
  4. thin edge

Answer(s): B,C

Explanation:

SD-WAN allows efficient and secure routing of traffic from users to corporate applications, while ZTNA enables secure access control and verification for users connecting to internal resources, both of which are essential for Secure Private Access (SPA) in FortiSASE.



Which two components are part of onboarding a secure web gateway (SWG) endpoint for secure internet access (SIA)? (Choose two.)

  1. proxy auto-configuration (PAC) file
  2. FortiSASE certificate authority (CA) certificate
  3. FortiClient software
  4. tunnel policy

Answer(s): A,C

Explanation:

A PAC file is used to redirect client web traffic through the SWG, and FortiClient software is required to connect endpoints to the FortiSASE service for secure internet access (SIA).



Which two advantages does FortiSASE bring to businesses with microbranch offices that have FortiAP deployed for unmanaged devices? (Choose two.)

  1. It secures internet access both on and off the network.
  2. It uses zero trust network access (ZTNA) tags to perform device compliance checks.
  3. It eliminates the requirement for an on-premises firewall.
  4. It simplifies management and provisioning.

Answer(s): A,C



Which information can an administrator monitor using reports generated on FortiSASE?

  1. sanctioned and unsanctioned Software-as-a-Service (SaaS) applications usage
  2. FortiClient vulnerability assessment
  3. SD-WAN performance
  4. FortiSASE administrator and system events

Answer(s): A

Explanation:

FortiSASE reporting provides visibility into the usage of sanctioned and unsanctioned SaaS applications, enabling administrators to monitor cloud application activity and enforce security policies.



In a FortiSASE secure web gateway (SWG) deployment, which two features protect against web- based threats? (Choose two.)

  1. SSL deep inspection for encrypted web traffic
  2. malware protection with sandboxing capabilities
  3. web application firewall (WAF) for web applications
  4. intrusion prevention system (IPS) for web traffic

Answer(s): A,B

Explanation:

SSL deep inspection allows FortiSASE to analyze encrypted web traffic for threats, while malware protection with sandboxing detects and blocks malicious files delivered through web channels.



Refer to the exhibits.



A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org.

Which configuration on FortiSASE is allowing users to perform the download?

  1. Web filter is allowing the URL.
  2. Deep inspection is not enabled.
  3. Application control is exempting all the browser traffic.
  4. Intrusion prevention is disabled.

Answer(s): B

Explanation:

The SSL inspection mode is set to certificate inspection, which only inspects SSL/TLS headers and does not allow full scanning of encrypted content. Without full (deep) inspection, the antivirus profile cannot scan or block malicious files (like eicar.com-zip) delivered over HTTPS, allowing the download to proceed.



Refer to the exhibit.

Based on the configuration shown, in which two ways will FortiSASE process sessions that require FortiSandbox inspection? (Choose two.)

  1. Only endpoints assigned a profile for sandbox detection will be processed by the sandbox feature.
  2. FortiClient quarantines only infected files that FortiSandbox detects as medium level.
  3. All files executed on a USB drive will be sent to FortiSandbox for analysis.
  4. All files will be sent to a on-premises FortiSandbox for inspection.

Answer(s): A,C

Explanation:

The sandbox feature applies only to endpoints assigned this profile, and the configuration explicitly enables the submission of all files executed from removable media (like USB drives) to FortiSandbox for analysis.



An administrator must restrict endpoints from certain countries from connecting to FortiSASE.
Which configuration can achieve this?

  1. Configure a network lockdown policy on the endpoint profiles.
  2. Configure a geography address object as the source for a deny policy.
  3. Configure geofencing to restrict access from the required countries.
  4. Configure source IP anchoring to restrict access from the specified countries.

Answer(s): C

Explanation:

Geofencing allows the administrator to restrict or allow access to FortiSASE services based on the geographic location of the endpoints, effectively blocking connections from specified countries.



Viewing Page 1 of 8



Share your comments for Fortinet FCSS_SASE_AD-25 exam with other users:

Sandeep 12/29/2023 4:07:00 AM

very useful
Anonymous


kevin 9/29/2023 8:04:00 AM

physical tempering techniques
Anonymous


Blessious Phiri 8/15/2023 4:08:00 PM

its giving best technical knowledge
Anonymous


Testbear 6/13/2023 11:15:00 AM

please upload
ITALY


shime 10/24/2023 4:23:00 AM

great question with explanation thanks!!
ETHIOPIA


Thembelani 5/30/2023 2:40:00 AM

does this exam have lab sections?
Anonymous


Shin 9/8/2023 5:31:00 AM

please upload
PHILIPPINES


priti kagwade 7/22/2023 5:17:00 AM

please upload the braindump for .net
UNITED STATES


Robe 9/27/2023 8:15:00 PM

i need this exam 1z0-1107-2. please.
Anonymous


Chiranthaka 9/20/2023 11:22:00 AM

very useful!
Anonymous


Not Miguel 11/26/2023 9:43:00 PM

for this question - "which three type of basic patient or member information is displayed on the patient info component? (choose three.)", list of conditions is not displayed (it is displayed in patient card, not patient info). so should be thumbnail of chatter photo
Anonymous


Andrus 12/17/2023 12:09:00 PM

q52 should be d. vm storage controller bandwidth represents the amount of data (in terms of bandwidth) that a vms storage controller is using to read and write data to the storage fabric.
Anonymous


Raj 5/25/2023 8:43:00 AM

nice questions
UNITED STATES


max 12/22/2023 3:45:00 PM

very useful
Anonymous


Muhammad Rawish Siddiqui 12/8/2023 6:12:00 PM

question # 208: failure logs is not an example of operational metadata.
SAUDI ARABIA


Sachin Bedi 1/5/2024 4:47:00 AM

good questions
Anonymous


Kenneth 12/8/2023 7:34:00 AM

thank you for the test materials!
KOREA REPUBLIC OF


Harjinder Singh 8/9/2023 4:16:00 AM

its very helpful
HONG KONG


SD 7/13/2023 12:56:00 AM

good questions
UNITED STATES


kanjoe 7/2/2023 11:40:00 AM

good questons
UNITED STATES


Mahmoud 7/6/2023 4:24:00 AM

i need the dumb of the hcip security v4.0 exam
EGYPT


Wei 8/3/2023 4:18:00 AM

upload the dump please
HONG KONG


Stephen 10/3/2023 6:24:00 PM

yes, iam looking this
AUSTRALIA


Stephen 8/4/2023 9:08:00 PM

please upload cima e2 managing performance dumps
Anonymous


hp 6/16/2023 12:44:00 AM

wonderful questions
Anonymous


Priyo 11/14/2023 2:23:00 AM

i used this site since 2000, still great to support my career
INDONESIA


Jude 8/29/2023 1:56:00 PM

why is the answer to "which of the following is required by scrum?" all of the following stated below since most of them are not mandatory? sprint retrospective. members must be stand up at the daily scrum. sprint burndown chart. release planning.
UNITED STATES


Marc blue 9/15/2023 4:11:00 AM

great job. hope this helps out.
UNITED STATES


Anne 9/13/2023 2:33:00 AM

upload please. many thanks!
Anonymous


pepe el toro 9/12/2023 7:55:00 PM

this is so interesting
Anonymous


Antony 11/28/2023 12:13:00 AM

great material thanks
AUSTRALIA


Thembelani 5/30/2023 2:22:00 AM

anyone who wrote this exam recently
Anonymous


P 9/16/2023 1:27:00 AM

ok they re good
Anonymous


Jorn 7/13/2023 5:05:00 AM

relevant questions
UNITED KINGDOM