Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

FCSS_EFW_AD-7.6 Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator Questions and Answers

Questions 4

Refer to the exhibit.

The routing tables of FortiGate_A and FortiGate_B are shown. FortiGate_A and FortiGate_B are in the same autonomous system.

The administrator wants to dynamically add only route 172.16.1.248/30 on FortiGate_A.

What must the administrator configure?

Options:

A.

The prefix 172.16.1.248/30 in the BGP Networks section on FortiGate_B

B.

A BGP route map out for 172.16.1.248/30 on FortiGate_B

C.

Enable Redistribute Connected in the BGP section on FortiGate_B.

D.

A BGP route map in for 172.16.1.248/30 on FortiGate_A

Buy Now
Questions 5

An administrator must minimize CPU and RAM use on a FortiGate firewall while also enabling essential security features, such as web filtering and application control for HTTPS traffic.

Which SSL inspection setting helps reduce system load while also enabling security features, such as web filtering and application control for encrypted HTTPS traffic?

Options:

A.

Use full SSL inspection to thoroughly inspect encrypted payloads.

B.

Disable SSL inspection entirely to conserve resources.

C.

Configure SSL inspection to handle HTTPS traffic efficiently.

D.

Enable SSL certificate inspection mode to perform basic checks without decrypting traffic.

Buy Now
Questions 6

How do you allow IPS inspection of inbound HTTPS traffic?

Options:

A.

Enable HTTP

B.

Enable HTTPS mapping

C.

Enable SMTPS

D.

Disable inspection

Buy Now
Questions 7

Which two approaches facilitate efficient ADVPN deployment?

Options:

A.

VPN Manager enable

B.

Best link only

C.

Loopback

D.

IPsec templates

Buy Now
Questions 8

Refer to the exhibit, which shows the HA status of an active-passive cluster.

An administrator wants FortiGate_B to handle the Core2 VDOM traffic.

Which modification must the administrator apply to achieve this?

Options:

A.

The administrator must disable override on FortiGate_A.

B.

The administrator must change the priority from 100 to 160 for FortiGate_B.

C.

The administrator must change the load balancing method on FortiGate_B.

D.

The administrator must change the priority from 128 to 200 for FortiGate_B.

Buy Now
Questions 9

How can you automate updates to firewall policies using a daily updated IP block list?

Options:

A.

Automation stitch

B.

External Feeds

C.

CLI scripts

D.

ZTNA

Buy Now
Questions 10

Refer to the exhibit, which contains the partial output of an OSPF command.

An administrator is checking the OSPF status of a FortiGate device and receives the output shown in the exhibit.

Which statement on this FortiGate device is correct?

Options:

A.

The FortiGate device can inject external routing information.

B.

The FortiGate device is in the area 0.0.0.5.

C.

The FortiGate device does not support OSPF ECMP.

D.

The FortiGate device is a backup designated router.

Buy Now
Questions 11

Which action should you take after applying a block-all IPS profile that caused applications to stop working?

Options:

A.

Disable IPS

B.

Use monitor mode

C.

Enable flow mode

D.

Remove server targets

Buy Now
Questions 12

Refer to the exhibit, which shows an OSPF network.

Which configuration must the administrator apply to optimize the OSPF database?

Options:

A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

Buy Now
Questions 13

How can FortiGate_B advertise only 172.16.1.248/30 using BGP?

Options:

A.

Redistribute connected

B.

Route map out

C.

Prefix list in

D.

Network

Buy Now
Questions 14

Refer to the exhibit, which contains a partial VPN configuration.

FCSS_EFW_AD-7.6 Question 14

What can you conclude from this VPN IPsec phase 1 configuration?

Options:

A.

This configuration is the best for networks with regular traffic intervals, providing a balance between connectivity assurance and resource utilization.

B.

Peer IDs are unencrypted and exposed, creating a security risk.

C.

FortiGate will not add a route to its routing or forwarding information base when the dynamic tunnel is negotiated.

D.

A separate interface is created for each dial-up tunnel, which can be slower and more resource intensive, especially in large networks.

Buy Now
Questions 15

How should you adjust MTU values to resolve encapsulation issues?

Options:

A.

All interfaces

B.

Wired only

C.

FortiGate only

D.

Controlled environment

Buy Now
Questions 16

Refer to the exhibit, which shows a network diagram showing the addition of site 2 with an overlapping network segment to the existing VPN IPsec connection between the hub and site 1.

FCSS_EFW_AD-7.6 Question 16

Which IPsec phase 2 configuration must an administrator make on the FortiGate hub to enable equal-cost multi-path (ECMP) routing when multiple remote sites connect with overlapping subnets?

Options:

A.

Set route-overlap to either use-new or use-old

B.

Set net-device to ecmp

C.

Set single-source to enable

D.

Set route-overlap to allow

Buy Now
Questions 17

A FortiGate device using unified threat management (UTM) profiles is reaching resource limits, and you expect traffic in your enterprise network to increase. You received an additional FortiGate of the same model.

Which two options should you consider using to integrate the additional FortiGate into your enterprise network? (Choose two.)

Options:

A.

FortiGate Session Life Support Protocol (FGSP) with external load balancers

B.

FortiGate Clustering Protocol (FGCP) in active-active (A-A) mode with switches

C.

Virtual Router Redundancy Protocol (VRRP) with switches

D.

FortiGate Clustering Protocol (FGCP) in active-passive (A-P) mode with VDOM disabled

Buy Now
Questions 18

Refer to the exhibit.

An administrator is deploying a hub and spokes network and using OSPF as dynamic protocol.

Which configuration is mandatory for neighbor adjacency?

Options:

A.

Set bfd enable in the router configuration

B.

Set network-type point-to-multipoint in the hub interface

C.

Set rfc1583-compatible enable in the router configuration

D.

Set virtual-link enable in the hub interface

Buy Now
Questions 19

Why does FortiGate_B install only one OSPF external route?

Options:

A.

ECMP disabled

B.

Single advertisement

C.

Area mismatch

D.

Route filtering

Buy Now
Questions 20

You configured the FortiGate devices in an enterprise network to join the Fortinet Security Fabric. You have a list of IP addresses that must be blocked by the data center firewall. This list is updated daily.

How can you automate updates to the firewall policy to add the IP addresses from the daily updated list?

Options:

A.

With a Security Fabric automation

B.

With an external connector from External Feeds

C.

With metadata variables in FortiManager

D.

With a CLI script in FortiManager

Buy Now
Questions 21

Refer to the exhibit.

A physical topology along with a traffic log is shown. You are using FortiAnalyzer to monitor traffic from the device with IP address 10.0.2.51, which is located behind the FortiGate internal segmentation firewall (ISFW) device. Unified threat management (UTM) is not enabled in the firewall policy on the HQ-ISFW device, and you are surprised to see a log with the action Malware, as shown in the exhibit. What are two reasons why FortiAnalyzer would display this log? (Choose two answers)

Options:

A.

HQ-ISFW is not connected to FortiAnalyzer and traffic must go through HQ-NGFW-1.

B.

UTM is enabled in the firewall policy in HQ-NGFW-1.

C.

HQ-ISFW is in a Security Fabric environment.

D.

Security rating is enabled in HQ-ISFW.

Buy Now
Questions 22

Which hardware improves VXLAN performance?

Options:

A.

CPU

B.

NTurbo

C.

CP10

D.

NPU7

Buy Now
Questions 23

To secure your enterprise network traffic, which step does FortiGate perform first, when handling the first packets of a session? (Choose one answer)

Options:

A.

Installation of the session key in the network processor (NP)

B.

Decryption

C.

A reverse path forwarding (RPF) check

D.

IP integrity header checking

Buy Now
Questions 24

Refer to the exhibit, which shows a LAN interface connected from FortiGate to two FortiSwitch devices.

What two conclusions can you draw from the corresponding LAN interface? (Choose two.)

Options:

A.

You must enable STP or RSTP on FortiGate and FortiSwitch to avoid layer 2 loopbacks.

B.

The LAN interface must use a 802.3ad type interface.

C.

This connection is using a FortiLInk to manage VLANs on FortiGate.

D.

FortiGate is using an SD-WAN-type interface to connect to a FortiSwitch device with MCLAG.

Buy Now
Questions 25

Refer to the exhibit, which shows the ADVPN network topology and partial BGP configuration.

FCSS_EFW_AD-7.6 Question 25

FCSS_EFW_AD-7.6 Question 25

Which two parameters must an administrator configure in the config neighbor range for spokes shown in the exhibit? (Choose two.)

Options:

A.

set max-neighbor-num 2

B.

set neighbor-group advpn

C.

set route-reflector-client enable

D.

set prefix 172.16.1.0 255.255.255.0

Buy Now
Questions 26

What does npu_flag=20 indicate for IPsec tunnels?

Options:

A.

Inbound only

B.

Outbound only

C.

Both SAs

D.

No offload

Buy Now
Questions 27

Refer to the exhibits.

A policy package conflict status and information from the import device wizard in the Core1 VDOM are shown. When you import a policy package, the following message appears for the Web_restrictions web filter profile and the deep-inspection SSL-SSH profile: " The following objects were found having conflicts. Please confirm your settings, then continue. " The Web_restrictions and deep-inspection profiles are used by other FortiGate devices within FortiManager. Which step must you take to resolve the issue? (Choose one answer)

Options:

A.

Retrieve the FortiGate configuration to automatically export correct objects and policies.

B.

Create uniquely named objects on FortiGate and reimport them into the policy package.

C.

Select the FortiManager configuration that accepts changes on FortiManager and preserves existing configurations on FortiGate devices.

D.

Use non-default object values because FortiManager is unable to alter default values.

Buy Now
Questions 28

Refer to the exhibits.

FCSS_EFW_AD-7.6 Question 28

FCSS_EFW_AD-7.6 Question 28

The Administrators section of a root FortiGate device and the Security Fabric Settings section of a downstream FortiGate device are shown.

When prompted to sign in with Security Fabric in the downstream FortiGate device, a user enters the AdminSSO credentials.

What is the next status for the user?

Options:

A.

The user is prompted to create an SSO administrator account for AdminSSO.

B.

The user receives an authentication failure message.

C.

The user accesses the downstream FortiGate with super_admin_readonly privileges.

D.

The user accesses the downstream FortiGate with super_admin privileges.

Buy Now
Questions 29

Refer to the exhibit, which shows a hub and spokes deployment.

FCSS_EFW_AD-7.6 Question 29

An administrator is deploying several spokes, including the BGP configuration for the spokes to connect to the hub.

Which two commands allow the administrator to minimize the configuration? (Choose two.)

Options:

A.

neighbor-group

B.

route-reflector-client

C.

neighbor-range

D.

ibgp-enforce-multihop

Buy Now
Questions 30

Which two recommendations prevent invalid paths when using zero phase 2 selectors?

Options:

A.

Routing protocols

B.

Exact selectors

C.

Aggregate IPsec

D.

Assign tunnel IP

Buy Now
Questions 31

Which two options integrate an additional FortiGate for scaling?

Options:

A.

FGSP

B.

FGCP Active-Active

C.

VRRP

D.

FGCP Active-Passive

Buy Now
Questions 32

Refer to the exhibit, which shows a partial troubleshooting command output.

An administrator is extensively using IPsec on FortiGate. Many tunnels show information similar to the output shown in the exhibit.

What can the administrator conclude?

Options:

A.

IPsec SAs cannot be offloaded.

B.

The two IPsec SAs, inbound and outbound, are copied to the NPU.

C.

Only the outbound IPsec SA is copied to the NPU.

D.

Only the inbound IPsec SA is copied to the NPU.

Buy Now
Questions 33

A company ' s guest internet policy, operating in proxy mode, blocks access to Artificial Intelligence Technology sites using FortiGuard. However, a guest user accessed a page in this category using port 8443.

Which configuration changes are required for FortiGate to analyze HTTPS traffic on nonstandard ports like 8443 when full SSL inspection is active in the guest policy?

Options:

A.

Add a URL wildcard domain to the website CA certificate and use it in the SSL/SSH Inspection Profile.

B.

In the Protocol Port Mapping section of the SSL/SSH Inspection Profile, enter 443, 8443 to analyze both standard (443) and non-standard (8443) HTTPS ports.

C.

To analyze nonstandard ports in web filter profiles, use TLSv1.3 in the SSL/SSH Inspection Profile.

D.

Administrators can block traffic on nonstandard ports by enabling the SNI check in the SSL/SSH Inspection Profile.

Buy Now
Exam Code: FCSS_EFW_AD-7.6
Exam Name: Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator
Last Update: Apr 11, 2026
Questions: 113

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now FCSS_EFW_AD-7.6 testing engine

PDF (Q&A)

$43.57  $124.49
buy now FCSS_EFW_AD-7.6 pdf