FCSS_SASE_AD-24 Online Practice Questions

Home / Fortinet / FCSS_SASE_AD-24

Latest FCSS_SASE_AD-24 Exam Practice Questions

The practice questions for FCSS_SASE_AD-24 exam was last updated on 2025-12-14 .

Viewing page 1 out of 3 pages.

Viewing questions 1 out of 19 questions.

Question#1

What access point communication protocol does FortiAP use to communicate with FortiSASE in a micro branch deployment?

A. Wireless Application Protocol (WAP)
B. Control and Provisioning of Wireless Access Points (CAPWAP)
C. Lightweight Access Point Protocol (LWAPP)
D. Inter-Access Point Protocol (IAPP)

Question#2

When viewing the daily summary report generated by FortiSASE, the administrator notices that the report contains very little data.
What is a possible explanation for this almost empty report?

A. Log allowed traffic is set to Security Events for all policies.
B. There are no security profile groups applied to all policies.
C. The web filter security profile is not set to Monitor.
D. Digital experience monitoring is not configured.

Explanation:
The issue of an almost empty daily summary report in FortiSASE can often be traced back to how logging is configured within the system. Specifically, if "Log Allowed Traffic" is set to "Security Events" for all policies, it means that only security-related events (such as threats or anomalies) are being logged, while normal, allowed traffic is not being recorded. Since most traffic in a typical network environment is allowed, this configuration would result in very little data being captured and subsequently reported in the daily summary.
Here’s a breakdown of why the other options are less likely to be the cause:
B. There are no security profile groups applied to all policies:While applying security profiles is important for comprehensive protection, their absence does not directly affect the volume of data in reports unless specific logging settings are also misconfigured.
C. The web filter security profile is not set to Monitor:This option pertains specifically to web filtering activities. Even if web filtering is not set to monitor mode, other types of traffic and logs should still populate the report.
D. Digital experience monitoring is not configured:Digital Experience Monitoring (DEM) focuses on user experience metrics rather than general traffic logging. Its absence would not lead to an almost empty report.
To resolve this issue, administrators should review the logging settings across all policies and ensure that "Log Allowed Traffic" is appropriately configured to capture the necessary data for reporting purposes.
Reference: Fortinet FCSS FortiSASE Documentation - Reporting and Logging Best Practices FortiSASE Administration Guide - Configuring Logging Settings

Question#3

Which statement describes the FortiGuard forensics analysis feature on FortiSASE?

A. It can help troubleshoot user-to-application performance issues.
B. It can help customers identify and mitigate potential risks to their network.
C. It can monitor endpoint resources in real-time.
D. It is a 24x7x365 monitoring service of your FortiSASE environment.

Explanation:
TheFortiGuard forensics analysis featureon FortiSASE is designed to help customersidentify and mitigate potential risks to their network. This feature provides detailed insights into suspicious activities, threats, and anomalies detected by FortiSASE. By analyzing logs, traffic patterns, and threat intelligence, FortiGuard forensics enables administrators to investigate incidents, understand their root causes, and take proactive measures to secure the network.
Here’s why the other options are incorrect:
A. It can help troubleshoot user-to-application performance issues:Performance troubleshooting is typically handled by features like Digital Experience Monitoring (DEM) or application performance monitoring tools, not forensics analysis.
C. It can monitor endpoint resources in real-time:Real-time endpoint monitoring is a function of endpoint security solutions like FortiClient or FortiEDR, not FortiGuard forensics analysis.
D. It is a 24x7x365 monitoring service of your FortiSASE environment:While Fortinet offers managed services for continuous monitoring, FortiGuard forensics analysis is not a dedicated monitoring service. Instead, it focuses on post-incident investigation and risk mitigation.
Reference: Fortinet FCSS FortiSASE Documentation - FortiGuard Forensics Analysis FortiSASE Administration Guide - Threat Detection and Response

Question#4

Refer to the exhibits.















A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub. The VPN tunnel does not establish
Based on the provided configuration, what configuration needs to be modified to bring the tunnel up?

A. NAT needs to be enabled in the Spoke-to-Hub firewall policy.
B. The BGP router ID needs to match on the hub and FortiSAS
C. FortiSASE spoke devices do not support mode config.
D. The hub needs IKEv2 enabled in the IPsec phase 1 settings.

Question#5

Refer to the exhibits.



Antivirus is installed on a Windows 10 endpoint, but the windows application firewall is stopping it from running.
What will the endpoint security posture check be?

A. FortiClient will block the endpoint from getting access to the network.
B. FortiClient telemetry will be disconnected because of failed compliance.
C. FortiClient will tag the endpoint as FortiSASE-Non-Compliant.
D. FortiClient will prompt the user to enable antivirus.

Exam Code: FCSS_SASE_AD-24Q & A: 54 Q&AsUpdated:  2025-12-14

 Get All FCSS_SASE_AD-24 Q&As