Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam FCSS_SASE_AD-23 Topic 2 Question 9 Discussion

Actual exam question for Fortinet's FCSS_SASE_AD-23 exam
Question #: 9
Topic #: 2
[All FCSS_SASE_AD-23 Questions]

An organization needs to resolve internal hostnames using its internal rather than public DNS servers for remotely connected endpoints. Which two components must be configured on FortiSASE to achieve this? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: B, C

To resolve internal hostnames using internal DNS servers for remotely connected endpoints, the following two components must be configured on FortiSASE:

Split DNS Rules:

Split DNS allows the configuration of specific DNS queries to be directed to internal DNS servers instead of public DNS servers.

This ensures that internal hostnames are resolved using the organization's internal DNS infrastructure, maintaining privacy and accuracy for internal network resources.

Split Tunneling Destinations:

Split tunneling allows specific traffic (such as DNS queries for internal domains) to be routed through the VPN tunnel while other traffic is sent directly to the internet.

By configuring split tunneling destinations, you can ensure that DNS queries for internal hostnames are directed through the VPN to the internal DNS servers.


FortiOS 7.2 Administration Guide: Provides details on configuring split DNS and split tunneling for VPN clients.

FortiSASE 23.2 Documentation: Explains the implementation and configuration of split DNS and split tunneling for securely resolving internal hostnames.

Contribute your Thoughts:

Shaunna
3 months ago
I bet the exam writer had a good laugh coming up with those distractors. 'Split tunneling destinations'? Really? Give me 'Split DNS rules' and 'DNS filter' any day.
upvoted 0 times
Dana
2 months ago
B) Split DNS rules
upvoted 0 times
...
Daren
3 months ago
A) SSL deep inspection
upvoted 0 times
...
...
Honey
3 months ago
Gotta love those tricky multiple-choice questions. Definitely picking 'Split DNS rules' and 'DNS filter' - can't go wrong with the DNS-based solutions.
upvoted 0 times
...
Kiley
3 months ago
Haha, SSL deep inspection? What, are they trying to resolve hostnames by decrypting the traffic? 'Split DNS rules' and 'DNS filter' are the way to go.
upvoted 0 times
Paz
2 months ago
Yeah, Split DNS rules and DNS filter make more sense for resolving internal hostnames.
upvoted 0 times
...
Sonia
3 months ago
Split DNS rules and DNS filter are the components needed for resolving internal hostnames.
upvoted 0 times
...
Zana
3 months ago
SSL deep inspection is for security, not resolving hostnames.
upvoted 0 times
...
...
Luis
3 months ago
DNS filter can be used to block or allow specific DNS queries, ensuring internal hostnames are resolved correctly.
upvoted 0 times
...
Tora
4 months ago
I'm not sure about DNS filter. Can someone explain how it helps in this scenario?
upvoted 0 times
...
Weldon
4 months ago
Hmm, split tunneling destinations? That's a bit of a stretch. I'd go with the DNS options for sure.
upvoted 0 times
Enola
3 months ago
Yeah, and we should also set up DNS filter on FortiSASE.
upvoted 0 times
...
Gianna
3 months ago
I think we need to configure Split DNS rules.
upvoted 0 times
...
...
Henriette
4 months ago
I agree with Luis. Split DNS rules will help resolve internal hostnames using internal DNS servers.
upvoted 0 times
...
Milly
4 months ago
Split DNS rules and DNS filter seem like the obvious choices here. I can't imagine trying to use SSL deep inspection or split tunneling for this requirement.
upvoted 0 times
Jacquline
4 months ago
B) Split DNS rules
upvoted 0 times
...
Corrinne
4 months ago
A) SSL deep inspection
upvoted 0 times
...
...
Luis
4 months ago
I think we need to configure Split DNS rules and DNS filter on FortiSASE.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77