Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Fortinet FCSS_EFW_AD-7.6 Practice Exam with Questions & Answers | Set: 3

Questions 21

Refer to the exhibit, which shows an ADVPN network.

FCSS_EFW_AD-7.6 Question 21

The client behind Spoke-1 generates traffic to the device located behind Spoke-2.

What is the first message that the hub sends to Spoke-1 to bring up the dynamic tunnel?

Options:
A.

Shortcut query

B.

Shortcut offer

C.

Shortcut reply

D.

Shortcut forward

Fortinet FCSS_EFW_AD-7.6 Premium Access
Questions 22

An administrator is setting up an ADVPN configuration and wants to ensure that peer IDs are not exposed during VPN establishment.

Which protocol can the administrator use to enhance security?

Options:
A.

Use IKEv2, which encrypts peer IDs and prevents exposure.

B.

Opt for SSL VPN web mode because it does not use peer IDs at all.

C.

Choose IKEv1 aggressive mode because it simplifies peer identification.

D.

Stick with IKEv1 main mode because it offers better performance.

Questions 23

Refer to the exhibit.

FCSS_EFW_AD-7.6 Question 23

The packet capture output of a client hello message is shown.

You are updating a firewall policy that includes SSL certificate inspection. You are capturing packets from the traffic passing through this firewall policy.

Which two statements about the packet capture are correct? (Choose two.)

Options:
A.

You can effectively apply an antivirus security profile to this traffic.

B.

You can effectively apply a web filtering profile to this traffic.

C.

The subject alternative name (SAN) is necessary to apply security profiles.

D.

The client supports only TLS versions 1.2 and 1.3.

Questions 24

Refer to the exhibit, which shows an OSPF network.

Which configuration must the administrator apply to optimize the OSPF database?

Options:
A.

Set a route map in the AS boundary FortiGate.

B.

Set the area 0.0.0.1 to the type STUB in the area border FortiGate.

C.

Set an access list in the AS boundary FortiGate.

D.

Set the area 0.0.0.1 to the type NSSA in the area border FortiGate.

Questions 25

During the maintenance window, an administrator must sniff all the traffic going through a specific firewall policy, which is handled by NP6 interfaces. The output of the sniffer trace provides just a few packets.

Why is the output of sniffer trace limited?

Options:
A.

The traffic corresponding to the firewall policy is encrypted.

B.

auto-asic-off load is set to enable in the firewall policy,

C.

inspection-mode is set to proxy in the firewall policy.

D.

The option npudbg is not added in the diagnose sniff packet command.

Questions 26

You must configure a loopback as a BGP source to connect to the ISP.

Which two commands must you use to establish the connection? (Choose two.)

Options:
A.

ebgp-enforce-multihop

B.

update-source

C.

ibgp-enforce-multihop

D.

recursive-next-hop

Questions 27

Refer to the exhibits.

The system administrator settings configured on a root FortiGate and the Security Fabric settings configured on a downstream FortiGate are shown.

When prompted to sign in with Security Fabric to the downstream FortiGate, a user enters the single sign-on (SSO) provider credentials.

What is the result?

Options:
A.

The downstream FortiGate creates an SSO administrator account for AdminSSO with the super_admin profile.

B.

The downstream FortiGate creates an SSO administrator account for AdminSSO with the super_admin_readonly profile.

C.

The user is prompted to create an administrator account for AdminSSO.

D.

The downstream FortiGate relies on the root FortiGate and does not create an administrator account.

Questions 28

You applied a block-all intrusion prevention system (IPS) profile for client and server targets to secure the server but the database team reported that applications stopped working immediately after.

How can you apply IPS in a way that ensures it does not disrupt existing applications in the network?

Options:
A.

Set the IPS profile signature action to default and verify patterns

B.

Use an IPS profile with all signatures in monitor mode and verify patterns before blocking.

C.

Select flow mode in the IPS profile and monitor the application patterns.

D.

Limit the IPS profile to server targets only and set the action to default.

Questions 29

Refer to the exhibit, which shows a network diagram.

An administrator would like to modify the MED value advertised from FortiGate_1 to a BGP neighbor in the autonomous system 30.

What must the administrator configure on FortiGate_1 to implement this?

Options:
A.

route-map-out

B.

network-import-check

C.

prefix-list-out

D.

distribute-list-out

Questions 30

An organization ' s guest Internet policy, operating in proxy mode, blocks access to artificial intelligence technology sites using FortiGuard. However, a guest user accessed a page in this category using port 8443.

Which configuration change must you make for FortiGate to analyze HTTPS traffic on nonstandard ports like 8443, when full SSL inspection is active in the guest policy?

Options:
A.

Block traffic on nonstandard ports by enabling server certificate SNI check in the SSL/SSH inspection profile.

B.

Enable network protocol enforcement for port 8443 with the protocol HTTPS in FortiGuard application control.

C.

Enter 443, 8443 to analyze both standard (443) and non-standard (8443) HTTPS ports in the protocol port mapping section of the SSL/SSH inspection profile.

D.

Block untrusted SSL certificates in the SSL/SSH inspection profile.

Exam Code: FCSS_EFW_AD-7.6
Certification Provider: Fortinet
Exam Name: Fortinet NSE 7 - Enterprise Firewall 7.6 Administrator
Last Update: Apr 11, 2026
Questions: 113