Practice Free NSE7_SSE_AD-25 Exam Online Questions
What can be configured on FortiSASE as an additional layer of security for FortiClient registration?
- A . security posture tags
- B . application inventory
- C . user verification
- D . device identification
Refer to the exhibit.

A customer needs to implement device posture checks for their remote endpoints while accessing the protected server. They also want the TCP traffic between the remote endpoints and the protected servers to be processed by FortiGate.
In this scenario, which two setups will achieve these requirements? (Choose two.)
- A . Configure ZTNA servers and ZTNA policies on FortiGate.
- B . Configure FortiGate as a zero trust network access (ZTNA) access proxy.
- C . Configure ZTNA tags on FortiGate.
- D . Configure private access policies on FortiSASE with ZTNA.
A,B
Explanation:
To enforce device posture checks and ensure that TCP traffic flows through FortiGate, the FortiGate must act as a ZTNA access proxy and host the ZTNA servers and policies. This setup allows posture validation via FortiSASE while routing traffic securely to protected servers through FortiGate.
Refer to the exhibit.

Based on the configuration shown, in which two ways will FortiSASE process sessions that require FortiSandbox inspection? (Choose two.)
- A . All infected files that FortiSandbox detects as malicious will be quarantined.
- B . Only endpoints assigned with profile for Sandbox Detection will be processed by the sandbox feature.
- C . All files detected on a LSE drive will be sent to FortiSandbox for analysis
- D . All infected files will be sent to a on-premises FortiSandbox for inspection
What is the benefit of SD-WAN on-ramp deployment with FortiSASE?
- A . To provide access to private applications using the bookmark portal
- B . To provide device compliance checks using ZTNA tags
- C . To secure internet traffic for branch users
- D . To manage branch location endpoints
C
Explanation:
SD-WAN on-ramp with FortiSASE directs branch user internet traffic to the FortiSASE cloud for consistent security enforcement and protection, regardless of the branch location.
A customer wants to upgrade their legacy on-premises proxy to a cloud-based proxy for a hybrid network.
Which two FortiSASE features would help the customer achieve this outcome? (Choose two.)
- A . secure web gateway (SWG)
- B . zero trust network access (ZTNA)
- C . sandbox cloud
- D . inline-CASB
A,D
Explanation:
The secure web gateway (SWG) serves as the cloud-based proxy that inspects and controls web traffic, replacing the on-premises proxy. The inline-CASB provides additional visibility and control over cloud application usage, enhancing security in hybrid environments.
When viewing the daily summary report generated by FortiSASE, the administrator notices that the report contains very little data.
What is a possible explanation for this almost empty report?
- A . Log allowed traffic is set to Security Events for all policies.
- B . There are no security profile groups applied to all policies.
- C . The web filter security profile is not set to Monitor.
- D . Digital experience monitoring is not configured.
A
Explanation:
The issue of an almost empty daily summary report in FortiSASE can often be traced back to how logging is configured within the system. Specifically, if "Log Allowed Traffic" is set to "Security Events" for all policies, it means that only security-related events (such as threats or anomalies) are being logged, while normal, allowed traffic is not being recorded. Since most traffic in a typical network environment is allowed, this configuration would result in very little data being captured and subsequently reported in the daily summary.
Here’s a breakdown of why the other options are less likely to be the cause:
B. There are no security profile groups applied to all policies:While applying security profiles is important for comprehensive protection, their absence does not directly affect the volume of data in reports unless specific logging settings are also misconfigured.
C. The web filter security profile is not set to Monitor:This option pertains specifically to web filtering activities. Even if web filtering is not set to monitor mode, other types of traffic and logs should still populate the report.
D. Digital experience monitoring is not configured:Digital Experience Monitoring (DEM) focuses on user experience metrics rather than general traffic logging. Its absence would not lead to an almost empty report.
To resolve this issue, administrators should review the logging settings across all policies and ensure that "Log Allowed Traffic" is appropriately configured to capture the necessary data for reporting purposes.
Reference: Fortinet FCSS FortiSASE Documentation – Reporting and Logging Best Practices FortiSASE Administration Guide – Configuring Logging Settings
What are two advantages of using zero-trust tags? (Choose two.)
- A . Zero-trust tags can determine the security posture of an endpoint.
- B . Zero-trust tags can be assigned to endpoint profiles based on user groups.
- C . Zero-trust tags can be used to allow or deny access to network resources.
- D . Zero-trust tags can help monitor endpoint system resource usage.
A,C
Explanation:
Zero-trust tags assess endpoint compliance based on defined posture rules and are used in access policies to control whether a device is permitted or denied access to specific network resources.
Your FortiSASE customer has a small branch office in which ten users will be using their personal laptops and mobile devices to access the internet.
Which deployment should they use to secure their internet access with minimal configuration?
- A . Deploy FortiGate as a LAN extension to secure internet access.
- B . Deploy FortiAP to secure internet access.
- C . Deploy FortiClient endpoint agent to secure internet access.
- D . Deploy SD-WAN on-ramp to secure internet access.
B
Explanation:
Deploying FortiAP enables secure internet access for unmanaged personal devices in small branch offices with minimal configuration by automatically directing traffic through FortiSASE, eliminating the need for endpoint installation or complex setup.
Which secure internet access (SIA) use case minimizes individual endpoint configuration?
- A . Agentless remote user internet access
- B . Site-based remote user internet access
- C . SIA using ZTNA
- D . SIA for FortiClient agent remote users
B
Explanation:
Site-based remote user internet access minimizes individual endpoint configuration by routing user traffic through a centralized FortiSASE connection point (such as a FortiAP or FortiGate), rather than requiring each device to be individually configured with the FortiClient agent.
In which two ways does FortiSASE help organizations ensure secure access for remote workers? (Choose two.)
- A . It secures traffic from endpoints to cloud applications.
- B . It uses the FortiCloud organizational units to assign endpoint profiles to remote workers.
- C . It uses the identity and access management (IAM) portal to validate the identities of remote workers.
- D . It offers zero trust network access (ZTNA) capabilities.
A,D
Explanation:
FortiSASE ensures secure access for remote workers by protecting traffic between endpoints and cloud applications and enforcing ZTNA policies that validate user identity and device posture before granting access to corporate resources.
