Month End Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

FCSS_NST_SE-7.6 Sample Questions Answers

Questions 4

The output of a policy route table entry is shown.

Which type of policy route does the output show?

Options:

A.

A regular policy route, which is not associated with an active static route in the FIB

B.

An ISDB route

C.

An SD-WAN rule

D.

A regular policy route, which is associated with an active static route in the FIB

Buy Now
Questions 5

Which two statements about Security Fabric communications are true? (Choose two.)

Options:

A.

FortiTelemetry and Neighbor Discovery both operate using TCP.

B.

The default port for Neighbor Discovery can be modified.

C.

FortiTelemetry must be manually enabled on the FortiGate interface.

D.

By default, the downstream FortiGate establishes a connection with the upstream FortiGate using TCP port 8013.

Buy Now
Questions 6

Which two statements are true regarding heartbeat messages sent from an FSSO collector agent to FortiGate? (Choose two.)

Options:

A.

The heartbeat messages can be seen using the command diagnose debug authd fsso list.

B.

The heartbeat messages can be seen in the collector agent logs.

C.

The heartbeat messages can be seen on FortiGate using the real-lime FSSO debug.

D.

The heartbeat messages must be manually enabled on FortiGate.

Buy Now
Questions 7

Refer to the exhibit.

Partial output of a real-time OSPF debug is shown.

Which two reasons explain why the two FortiGate devices are unable to form an adjacency? (Choose two.)

Options:

A.

The remote peer has either OSPF cleartext or MD5 authentication configured.

B.

There is an OSPF authentication configuration mismatch.

C.

The local FortiGate does not have OSPF authentication configured

D.

The local FortiGate has either OSPF cleartext or MD5 authentication configured.

Buy Now
Questions 8

Exhibit.

Refer to the exhibit, which shows the output of diagnose automation test.

What can you observe from the output? (Choose two.)

Options:

A.

The automation stitch test is not being logged.

B.

The automation stitch test failed but the HA failover was successful.

C.

An HA failover occurred.

D.

The test was unsuccessful.

Buy Now
Questions 9

Refer to the exhibit, which shows a partial output of a real-time LDAP debug.

What two conclusions can you draw from the output? (Choose two.)

Options:

A.

The user was found in the LDAP tree, whose root is TAC.ottawa.fortinet.com.

B.

FortiOS performs a bind to the LDAP server using the user's credentials.

C.

FortiOS collects the user group information.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

Buy Now
Questions 10

Refer to the exhibit, which a network topology and a partial routing table.

FortiGate has already been configured with a firewall policy that allows all ICMP traffic to flow from port1 to port3.

Which changes must the administrator perform to ensure the server at 10.4.0.1/24 receives the echo reply from the laptop at 10.1.0.1/24?

Options:

A.

Enable asymmetric routing under config system settings.

B.

Change the configuration from strict RPF check mode to feasible RPF check mode.

C.

A firewall policy that allows all ICMP traffic from port3 to port1.

D.

Modify the default gateway on the laptop from 10.1.0.2 to 10.2.0.2.

Buy Now
Questions 11

Refer to the exhibit.

The sniffer log on two FortiGate devices are shown. Based on the information in the log, which two factors explain the output on FortiGate FGT-02? (Choose two answers)

Options:

A.

A third-party device is blocking protocol 50.

B.

The administrator has not yet configured the VPN tunnel on FGT-02.

C.

The administrator configured the wrong remote peer IP address on FGT-01.

D.

The administrator set the wrong sniffer filter on FGT-02.

Buy Now
Questions 12

Which statement about parallel path processing is correct (PPP)?

Options:

A.

PPP chooses from a group of parallel options lo identity the optimal path tor processing a packet.

B.

Only FortiGate hardware configurations affect the path that a packet takes.

C.

PPP does not apply to packets that are part of an already established session.

D.

Software configuration has no impact on PPP.

Buy Now
Questions 13

What are two functions of automation stitches? (Choose two.)

Options:

A.

You can configure automation stitches on any FortiGate device in a Security Fabric environment.

B.

You can configure automation stitches to execute actions sequentially by taking parameters from previous actions as input for the current action.

C.

You can set an automation stitch configured to execute actions in parallel to insert a specific delay between actions.

D.

You can create automation stitches to run diagnostic commands and attach the results to an email message when CPU or memory usage exceeds specified thresholds.

Buy Now
Questions 14

Refer to the exhibit, which shows the output of a policy route table entry.

Which type of policy route does the output show?

Options:

A.

An ISDB route

B.

A regular policy route

C.

A regular policy route, which is associated with an active static route in the FIB

D.

An SD-WAN rule

Buy Now
Questions 15

In which two slates is a given session categorized as ephemeral? (Choose two.)

Options:

A.

A UDP session with only one packet received

B.

A UOP session with packets sent and received

C.

A TCP session waiting for the SYN ACK

D.

A TCP session waiting for FIN ACK

Buy Now
Questions 16

Refer to the exhibits.

An OSPF peer is advertising route 172.16.52.0/24. The local FortiGate is configured with an inbound distribution list that allows the 172.16.0.0/16 network to be injected into its routing table. However, the 1'2.16.52.0/24 subnet cannot be seen in the FIB.

Which two stops can the administrator of the local FortiGate take to ensure that the advertised 172.16. 52.0/24 subnet will be injected into the routing table? (Choose two.)

Options:

A.

Add another entry to the prefix list to specifically allow the 172.16.52.0/24 network.

B.

Change the ge value to 17.

C.

Change the R- value lo 16.

D.

Modify the default prefix-list behavior from implicit deny to implicit allow.

Buy Now
Questions 17

Exhibit.

Refer to the exhibit, which shows two entries that were generated in the FSSO collector agent logs.

What three conclusions can you draw from these log entries? {Choose three.)

Options:

A.

Remote registry is not running on the workstation.

B.

The user's status shows as "not verified" in the collector agent.

C.

DNS resolution is unable to resolve the workstation name.

D.

The FortiGate firmware version is not compatible with that of the collector agent.

E.

A firewall is blocking traffic to port 139 and 445.

Buy Now
Questions 18

In IKEv2, which exchange establishes the first CHILD_SA?

Options:

A.

IKE_SA_INIT

B.

INFORMATIONAL

C.

CREATE_CHILD_SA

D.

IKE_Auth

Buy Now
Questions 19

Refer to the exhibit.

Which two observations can you make about the web filter traffic captured using the flow tool? (Choose two.)

Options:

A.

The session is offloaded to the NPU.

B.

The firewall policy is configured with proxy-based inspection mode.

C.

The web filter profile is configured with proxy-based inspection mode.

D.

The HTTPS port is mapped to 443 in the SSL/SSH Inspection Profile

Buy Now
Questions 20

Refer to the exhibit, which shows a truncated output of a real-time LDAP debug.

What two conclusions can you draw from the output? (Choose two.)

Options:

A.

The name of the configured LDAP server is Lab.

B.

The user is authenticating using CN=John Smith.

C.

FortiOS is able to locate the user in step 3 (Bind Request) of the LDAP authentication process.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

Buy Now
Questions 21

Which statement about protocol options is true?

Options:

A.

Protocol options allow administrators to configure a maximum number of sessions for each configured protocol.

B.

Protocol options give administrators a streamlined method to instruct FortiGate to block all sessions corresponding to disabled protocols.

C.

Protocol options allow administrators to configure the Any setting for all enabled protocols, which provides the most efficient use of system resources.

D.

Protocol options allow administrators to configure which Layer 4 port numbers map to upper-layer protocols, such as HTTP, SMTP, FTP, and so on.

Buy Now
Questions 22

In a Security Fabric environment which three actions must you take to ensure successful communication among the nodes? (Choose three.)

Options:

A.

You must ensure that TCP port 8013 is not blocked along the way.

B.

You must ensure that the port for Neighbor Discovery has been changed.

C.

You must configure FortiGate in transparent mode.

D.

You must authorize the downstream FortiGate on the root FortiGate.

E.

You must enable FortiTelemetry on the receiving interlace of the upstream FortiGate.

Buy Now
Questions 23

Refer to the exhibit.

An IPsec VPN tunnel using IKEv2 was brought up successfully, but when the tunnel rekey takes place the tunnel goes down.

The debug command for IKE was enabled and, in the exhibit, you can review the partial output of the debug IKE while attempting to bring the tunnel up.

What is causing. The tunnel to be down?

Options:

A.

A Diffie-Hellman mismatch

B.

Blocked traffic on UDP port 500

C.

A mismatch m the Phase 1 negotiations

D.

A mismatch in the Phase 2 negotiations

Buy Now
Questions 24

Exhibit.

Refer to the exhibit, which shows a partial web fillet profile configuration.

Which action does FortiGate lake if a user attempts to access www. dropbox. com, which is categorized as File Sharing and Storage?

Options:

A.

FortiGate allows the connection, based on the URL Filter configuration.

B.

FortiGate blocks the connection as an invalid URL.

C.

FortiGate exempts the connection, based on the Web Content Filter configuration.

D.

FortiGate blocks the connection, based on the FortiGuard category based filter configuration.

Questions 25

Refer to the exhibit, which contains the output of diagnose vpn tunnel list.

Which command will capture ESP traffic for the VPN named DialUp_0?

Options:

A.

diagnose sniffer packet any 'ip proto 50'

B.

diagnose sniffer packet any 'host 10.0.10.10'

C.

diagnose sniffer packet any 'esp and host 10.200.3.2'

D.

diagnose sniffer packet any 'port 4500'

Buy Now
Questions 26

Refer to the exhibits,

which show the configuration on FortiGate and partial session information for internet traffic from a user on the internal network. If the priority on route ID 2 were changed from 10 to 0, what would happen to traffic matching that user session? (Choose one answer)

Options:

A.

The session would be deleted, and the client would need to start a new session.

B.

The session would remain in the session table, but its traffic would now egress from both port1 and port2.

C.

The session would remain in the session table, and its traffic would egress from port2.

D.

The session would remain in the session table, and its traffic would egress from port1.

Buy Now
Questions 27

What is an accurate description of LDAP authentication using the regular bind type?

Options:

A.

The regular bind requires the client to send the full distinguished name (ON).

B.

The regular bind type is the easiest bind type to configure on ForbOS.

C.

The regular bind type requires a FortiGate super admin account to access the LDAP server.

D.

It is not often used as a bind type

Buy Now
Questions 28

Which statement about IKEv2 is true?

Options:

A.

Both IKEv1 and IKEv2 share the feature of asymmetric authentication.

B.

IKEv1 and IKEv2 have enough of the header format in common that both versions can run over the same UDP port.

C.

IKEv1 and IKEv2 use same TCP port but run on different UDP ports.

D.

IKEv1 and IKEv2 share the concept of phase1 and phase2.

Buy Now
Questions 29

Which Iwo actions does FortiGate take after an administrator enables the auxiliary session selling? (Choose two.)

Options:

A.

FortiGate only offloads auxiliary sessions.

B.

FortiGate accelerates all ECMP traffic to the NP6 processor

C.

FortiGates creates a now auxiliary session for each packet it receives.

D.

FortiGate creates two sessions in case of a routing change.

Buy Now
Questions 30

Exhibit.

Refer to the exhibit, which shows the output of get system ha status.

NGFW-1 and NGFW-2 have been up for a week.

Which two statements about the output are true? (Choose two.)

Options:

A.

If a configuration change is made to the primary FortiGate at this time, the secondary will initiate a synchronization reset.

B.

If port 7 becomes disconnected on the secondary, both FortiGate devices will elect itself as primary.

C.

If FGVM...649 is rebooted. FGVM...650 will become the primary and retain that role, even after FGVM...649 rejoins the cluster.

D.

If no action is taken, the primary FortiGate will leave the cluster because of the current sync status.

Buy Now
Exam Code: FCSS_NST_SE-7.6
Exam Name: Fortinet NSE 6 - Network Security 7.6 Support Engineer
Last Update: Jan 28, 2026
Questions: 95
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now FCSS_NST_SE-7.6