Fortinet FCP_FGT_AD-7.6 Exam (page: 2)
Fortinet FCP - FortiGate 7.6 Administrator
Updated on: 02-Jan-2026

Viewing Page 2 of 12

An administrator wanted to configure an IPS sensor to block traffic that triggers a signature set number of times during a specific time period.

How can the administrator achieve the objective?

  1. Use IPS group signatures, set rate-mode 60.
  2. Use IPS packet logging option with periodical filter option.
  3. Use IPS filter, rate-mode periodical option.
  4. Use IPS signatures, rate-mode periodical option.

Answer(s): D

Explanation:

To block traffic that triggers a signature a specific number of times within a time period, the administrator must configure the IPS signature with the rate-mode periodical option.
This allows the IPS to count the number of times a signature is matched in a defined interval and take action (e.g., block) if the threshold is exceeded.



A FortiGate firewall policy is configured with active authentication, however, the user cannot authenticate when accessing a website.

Which protocol must FortiGate allow even though the user cannot authenticate?

  1. LDAP
  2. TACASC+
  3. Kerberos
  4. DNS

Answer(s): D

Explanation:

DNS traffic must be allowed so the user can resolve domain names and reach the authentication server or web resources, even if authentication initially fails.



Refer to the exhibit, which shows a partial configuration from the remote authentication server.



Why does the FortiGate administrator need this configuration?

  1. To set up a RADIUS server Secret.
  2. To authenticate Any FortiGate user groups.
  3. To authenticate and match the Training OU on the RADIUS server.
  4. To authenticate only the Training user group.

Answer(s): D

Explanation:

The Fortinet-Group-Name attribute is used to restrict authentication to users who belong specifically to the "Training" user group on the RADIUS server.



Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI.



Based on the exhibit, which statement is true?

  1. The Underlay zone is the zone by default.
  2. The Underlay zone contains no member.
  3. port2 and port3 are not assigned to a zone.
  4. The virtual-wan-link and overlay zones can be deleted.

Answer(s): A

Explanation:

The Underlay zone is the default SD-WAN zone, typically representing the physical interfaces in the SD-WAN configuration before overlay or virtual links are added.



Which three statements explain a flow-based antivirus profile? (Choose three.)

  1. FortiGate buffers the whole file but transmits to the client at the same time.
  2. Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection.
  3. If a virus is detected, the last packet is delivered to the client.
  4. Flow-based inspection optimizes performance compared to proxy-based inspection.
  5. The IPS engine handles the process as a standalone.

Answer(s): A,B,D

Explanation:

Flow-based antivirus buffers the entire file while simultaneously transmitting data to the client to minimize latency.
Flow-based inspection combines multiple scanning techniques from proxy-based modes for efficient detection.
Flow-based inspection provides better performance by processing traffic on the fly without full proxy overhead.



Refer to the exhibit.



An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow. This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times.

Why are there no logs generated under security logs for ABC.Com?

  1. The ABC.Com Type is set as Application instead of Filter.
  2. The ABC.Com is configured under application profile, which must be configured as a web filter profile.
  3. The ABCom Action is set to Allow.
  4. The ABC.Com is hitting the category Excessive-Bandwidth.

Answer(s): C

Explanation:

When the action is set to Allow in an application override, traffic matching this override is allowed without generating security logs because it bypasses deeper inspection and blocking.



Which two statements describe characteristics of automation stitches? (Choose two.)

  1. Actions involve only devices included in the Security Fabric.
  2. An automation stitch can have multiple triggers.
  3. Multiple actions can run in parallel.
  4. Triggers can involve external connectors.

Answer(s): C,D

Explanation:

Automation stitches can execute multiple actions concurrently (in parallel).
Triggers for automation stitches can come from external connectors beyond just Fortinet devices.



Which three statements about SD-WAN performance SLAs are true? (Choose three.)

  1. They rely on session loss and jitter.
  2. They can be measured actively or passively.
  3. They are applied in a SD-WAN rule lowest cost strategy.
  4. They monitor the state of the FortiGate device.
  5. All the SLA targets can be configured.

Answer(s): A,B,E

Explanation:

SD-WAN SLAs monitor metrics like packet loss and jitter to evaluate link performance.
SLA measurements can be performed using active probing or passive monitoring.
Administrators can configure all SLA target parameters to define performance criteria.



Viewing Page 2 of 12



Share your comments for Fortinet FCP_FGT_AD-7.6 exam with other users:

Khalid Javid 11/17/2023 3:46:00 PM

kindly share the dump
Anonymous


Na 8/9/2023 8:39:00 AM

could you please upload cfe fraud prevention and deterrence questions? it will be very much helpful.
Anonymous


shime 10/23/2023 10:03:00 AM

this is really very very helpful for mcd level 1
ETHIOPIA


Vnu 6/3/2023 2:39:00 AM

very helpful!
Anonymous


Steve 8/17/2023 2:19:00 PM

question #18s answer should be a, not d. this should be corrected. it should be minvalidityperiod
CANADA


RITEISH 12/24/2023 4:33:00 AM

thanks for the exact solution
Anonymous


SB 10/15/2023 7:58:00 AM

need to refer the questions and have to give the exam
INDIA


Mike Derfalem 7/16/2023 7:59:00 PM

i need it right now if it was possible please
Anonymous


Isak 7/6/2023 3:21:00 AM

i need it very much please share it in the fastest time.
Anonymous


Maria 6/23/2023 11:40:00 AM

correct answer is d for student.java program
IRELAND


Nagendra Pedipina 7/12/2023 9:10:00 AM

q:37 c is correct
INDIA


John 9/16/2023 9:37:00 PM

q6 exam topic: terramearth, c: correct answer: copy 1petabyte to encrypted usb device ???
GERMANY


SAM 12/4/2023 12:56:00 AM

explained answers
INDIA


Andy 12/26/2023 9:35:00 PM

plan to take theaws certified developer - associate dva-c02 in the next few weeks
SINGAPORE


siva 5/17/2023 12:32:00 AM

very helpfull
Anonymous


mouna 9/27/2023 8:53:00 AM

good questions
Anonymous


Bhavya 9/12/2023 7:18:00 AM

help to practice csa exam
Anonymous


Malik 9/28/2023 1:09:00 PM

nice tip and well documented
Anonymous


rodrigo 6/22/2023 7:55:00 AM

i need the exam
Anonymous


Dan 6/29/2023 1:53:00 PM

please upload
Anonymous


Ale M 11/22/2023 6:38:00 PM

prepping for fsc exam
AUSTRALIA


ahmad hassan 9/6/2023 3:26:00 AM

pd1 with great experience
Anonymous


Žarko 9/5/2023 3:35:00 AM

@t it seems like azure service bus message quesues could be the best solution
UNITED KINGDOM


Shiji 10/15/2023 1:08:00 PM

helpful to check your understanding.
INDIA


Da Costa 8/27/2023 11:43:00 AM

question 128 the answer should be static not auto
Anonymous


bot 7/26/2023 6:45:00 PM

more comments here
UNITED STATES


Kaleemullah 12/31/2023 1:35:00 AM

great support to appear for exams
Anonymous


Bsmaind 8/20/2023 9:26:00 AM

useful dumps
Anonymous


Blessious Phiri 8/13/2023 8:37:00 AM

making progress
Anonymous


Nabla 9/17/2023 10:20:00 AM

q31 answer should be d i think
FRANCE


vladputin 7/20/2023 5:00:00 AM

is this real?
UNITED STATES


Nick W 9/29/2023 7:32:00 AM

q10: c and f are also true. q11: this is outdated. you no longer need ownership on a pipe to operate it
Anonymous


Naveed 8/28/2023 2:48:00 AM

good questions with simple explanation
UNITED STATES


cert 9/24/2023 4:53:00 PM

admin guide (windows) respond to malicious causality chains. when the cortex xdr agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files—the agent can automatically block the ip address to close all existing communication and block new connections from this ip address to the endpoint. when cortex xdrblocks an ip address per endpoint, that address remains blocked throughout all agent profiles and policies, including any host-firewall policy rules. you can view the list of all blocked ip addresses per endpoint from the action center, as well as unblock them to re-enable communication as appropriate. this module is supported with cortex xdr agent 7.3.0 and later. select the action mode to take when the cortex xdr agent detects remote malicious causality chains: enabled (default)—terminate connection and block ip address of the remote connection. disabled—do not block remote ip addresses. to allow specific and known s
Anonymous