Questions for the FCSS SASE AD 25 were updated on : Nov 23 ,2025
Refer to the exhibits.



A FortiSASE administrator is trying to configure FortiSASE as a spoke to a FortiGate hub.
The VPN tunnel does not establish.
Which configuration needs to be modified to bring the tunnel up?
B
Explanation:
Fortinet documentation makes clear that overlay IDs must be identical on hub and spoke for ADVPN
to establish correctly:
“When configuring the root and downstream FortiGates the Fabric Overlay Orchestrator configures…
IPsec overlay configuration (hub and spoke ADVPN tunnels).”
“The Fabric root will be the hub and any first-level downstream devices from the Fabric root will be
spokes.”
In the scenario:
FortiSASE overlay ID = 100
FortiGate hub overlay ID = 101
Mismatch prevents tunnel establishment. Therefore, the fix is: B. The network overlay ID must match
on FortiSASE and the hub.
Refer to the exhibit.

An endpoint is assigned an IP address of 192.168.13.101/24.
Which action will be run on the endpoint?
A
Explanation:
The FortiClient Administration Guide states that on-net rules determine when an endpoint is in a
trusted location. If the endpoint matches the configured subnet, the client is considered on-net, and
therefore bypasses auto-connect.
“Device registration and on-net status information for a device that is running FortiClient appears
only on the FortiGate that applies the FortiClient profile to that device.”
Since 192.168.13.101 falls inside the trusted subnet 192.168.13.0/24, the endpoint is treated as on-
net → it will be exempted from auto-connect.
Which two are required to enable central management on FortiSASE? (Choose two.)
B,D
Explanation:
According to the FortiOS Administration Guide, when configuring central management, a
FortiManager Cloud entitlement must be present and the devices must share the same FortiCloud
account for registration. Specifically:
“The FortiManager Cloud button can only be selected if you have a FortiManager Cloud product
entitlement.”
“The FortiGate and FortiCloud license are registered to the same account.”
Thus, the two verified requirements are: B (entitlement) and D (same FortiCloud account).
Refer to the exhibit.
The daily report for application usage for internet traffic shows an unusually high number of
unknown applications by category.
What are two possible explanations for this? (Choose two.)
A,B
Your organization is currently using FortiSASE for its cybersecurity. They have recently hired a
contractor who will work from the HQ office and who needs temporary internet access in order to
set up a web-based point of sale (POS) system.
What is the recommended way to provide internet access to the contractor?
B
Explanation:
The self-registration portal is the recommended method for granting temporary internet access to
contractors or guests. It provides a simple and secure way for the contractor to authenticate and
access the internet without requiring full endpoint management or policy configuration.
Which two of the following can release the network lockdown on the endpoint applied by FortiSASE?
(Choose two.)\
A,D
Explanation:
FortiSASE releases network lockdown when the endpoint re-establishes the tunnel connection or
when it is verified as compliant through ZTNA tag evaluation, ensuring it meets security posture
requirements.
Refer to the exhibits.
How will the application vulnerabilities be patched, based on the exhibits provided?
B
What are two benefits of deploying secure private access with SD-WAN? (Choose two.)
B,C
Explanation:
Deploying secure private access with SD-WAN enables the hub FortiGate to perform ZTNA posture
checks, and supports both TCP and UDP applications over the tunnel, allowing for flexible and secure
access to internal resources.
Which statement applies to a single sign-on (SSO) deployment on FortiSASE?
C
Explanation:
In FortiSASE, Single Sign-On (SSO) takes precedence and overrides other configured user
authentication methods, ensuring a centralized and streamlined authentication process across
services.
When accessing the FortiSASE portal for the first time, an administrator must select data center
locations for which three FortiSASE components? (Choose three.)
B,C,D
What is required to enable the MSSP feature on FortiSASE?
A
Explanation:
To enable the MSSP feature on FortiSASE, you must use the FortiCloud IAM portal to assign RBAC
permissions to users. This grants appropriate access to manage multiple tenants or customer
accounts securely.
What happens to the logs on FortiSASE that are older than the configured log retention period?
A
Explanation:
Once the configured log retention period expires, FortiSASE automatically deletes the older logs to
free up storage and maintain compliance with retention policies.
Refer to the exhibit.
An organization must inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps
traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical interface.
Which configuration must you apply to achieve this requirement?
C
Explanation:
To exclude specific internet traffic (such as Google Maps) from being tunneled through FortiSASE and
instead direct it out the local endpoint interface, you must configure it as a steering bypass
destination in the FortiClient endpoint profile. This ensures traffic matching the URL bypasses the
FortiSASE tunnel.
Refer to the exhibit.
A customer needs to implement device posture checks for their remote endpoints while accessing
the protected server. They also want the TCP traffic between the remote endpoints and the
protected servers to be processed by FortiGate.
In this scenario, which two setups will achieve these requirements? (Choose two.)
A,B
Explanation:
To enforce device posture checks and ensure that TCP traffic flows through FortiGate, the FortiGate
must act as a ZTNA access proxy and host the ZTNA servers and policies. This setup allows posture
validation via FortiSASE while routing traffic securely to protected servers through FortiGate.
An organization must block user attempts to log in to non-company resources while using Microsoft
Office 365 to prevent users from accessing unapproved cloud resources.
Which FortiSASE feature can you implement to meet this requirement?
C