In the Secure Private Access (SPA) use case, which two FortiSASE features facilitate access to
corporate applications? (Choose two.)
B,C
Explanation:
SD-WAN allows efficient and secure routing of traffic from users to corporate applications, while
ZTNA enables secure access control and verification for users connecting to internal resources, both
of which are essential for Secure Private Access (SPA) in FortiSASE.
Which two components are part of onboarding a secure web gateway (SWG) endpoint for secure
internet access (SIA)? (Choose two.)
A,C
Explanation:
A PAC file is used to redirect client web traffic through the SWG, and FortiClient software is required
to connect endpoints to the FortiSASE service for secure internet access (SIA).
Which two advantages does FortiSASE bring to businesses with microbranch offices that have FortiAP
deployed for unmanaged devices? (Choose two.)
A,C
Which information can an administrator monitor using reports generated on FortiSASE?
A
Explanation:
FortiSASE reporting provides visibility into the usage of sanctioned and unsanctioned SaaS
applications, enabling administrators to monitor cloud application activity and enforce security
policies.
In a FortiSASE secure web gateway (SWG) deployment, which two features protect against web-
based threats? (Choose two.)
A,B
Explanation:
SSL deep inspection allows FortiSASE to analyze encrypted web traffic for threats, while malware
protection with sandboxing detects and blocks malicious files delivered through web channels.
Refer to the exhibits.

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied
it to the internet access policy. Remote users are still able to download the eicar.com-zip file from
https://eicar.org.
Which configuration on FortiSASE is allowing users to perform the download?
B
Explanation:
The SSL inspection mode is set to certificate inspection, which only inspects SSL/TLS headers and
does not allow full scanning of encrypted content. Without full (deep) inspection, the antivirus
profile cannot scan or block malicious files (like eicar.com-zip) delivered over HTTPS, allowing the
download to proceed.
Refer to the exhibit.
Based on the configuration shown, in which two ways will FortiSASE process sessions that require
FortiSandbox inspection? (Choose two.)
A,C
Explanation:
The sandbox feature applies only to endpoints assigned this profile, and the configuration explicitly
enables the submission of all files executed from removable media (like USB drives) to FortiSandbox
for analysis.
An administrator must restrict endpoints from certain countries from connecting to FortiSASE.
Which configuration can achieve this?
C
Explanation:
Geofencing allows the administrator to restrict or allow access to FortiSASE services based on the
geographic location of the endpoints, effectively blocking connections from specified countries.
What is the benefit of SD-WAN on-ramp deployment with FortiSASE?
C
Explanation:
SD-WAN on-ramp with FortiSASE directs branch user internet traffic to the FortiSASE cloud for
consistent security enforcement and protection, regardless of the branch location.
Which two settings are automatically pushed from FortiSASE to FortiClient in a new FortiSASE
deployment with default settings? (Choose two.)
B,C
Explanation:
In a default FortiSASE deployment, the tunnel profile (for secure connectivity) and the FortiSASE CA
certificate (for SSL inspection and trusted communication) are automatically pushed to FortiClient
endpoints.
Refer to the exhibits.


Jumpbox and Windows-AD are endpoints from the same remote location. Jumpbox can access the
internet through FortiSASE, while Windows-AD can no longer access the internet.
Based on the information in the exhibits, which reason explains the outage on Windows-AD?
C
Explanation:
The Windows-AD endpoint now has both "FortiSASE-Compliant" and "FortiSASE-Non-Compliant"
tags due to failing the antivirus software check. As a result, the Secure Internet Access Policy matches
the "Non-Compliant" rule, which is set to Deny, causing the device to lose internet access.
Which description of the FortiSASE inline-CASB component is true?
B
Explanation:
FortiSASE inline-CASB operates in the traffic path to provide real-time visibility and control over data
in motion as it is transmitted to and from cloud applications.
Which authentication method overrides any other previously configured user authentication on
FortiSASE?
D
Explanation:
Single Sign-On (SSO) overrides any other previously configured user authentication method on
FortiSASE, taking precedence for user authentication.
What are two advantages of using zero-trust tags? (Choose two.)
A,C
Explanation:
Zero-trust tags assess endpoint compliance based on defined posture rules and are used in access
policies to control whether a device is permitted or denied access to specific network resources.
Which FortiSASE feature ensures least-privileged user access to corporate applications that are
protected by an on-premises FortiGate device?
B
Explanation:
ZTNA enforces least-privileged access by verifying user identity and device posture before granting
access to specific corporate applications, even when protected by an on-premises FortiGate.