Fortinet FCSS_CDS_AR-7.6 Exam (page: 1)
Fortinet FCSS - Public Cloud Security 7.6 Architect
Updated on: 26-Oct-2025

Viewing Page 1 of 6

An administrator would like to use FortiCNP to keep track of sensitive data files located in the Amazon Web Services (AWS) S3 bucket and protect it from malware.
Which FortiCNP feature should the administrator use?

  1. FortiCNP Threat Detection policies
  2. FortiCNP Risk Management policies
  3. FortiCNP Data Scan policies
  4. FortiCNP Compliance policies

Answer(s): C



You are using Ansible to modify the configuration of several FortiGate VMs.
What is the minimum number of files you need to create, and in which file should you configure the target FortiGate IP addresses?

  1. One playbook file for each target and the required tasks, and one inventory file.
  2. One .yaml file with the target IP addresses, and one playbook file with the tasks.
  3. One inventory file for each target device, and one playbook file.
  4. One text file for all target devices, and one playbook file.

Answer(s): B



Refer to the exhibit.



Refer to the exhibit.
The exhibit shows an active-passive high availability FortiGate pair with external and internal Azure load balancers.
There is no SDN connector used in this solution.
Which configuration must the administrator implement on each FortiGate?

  1. Single BGP route to Azure probe IP address.
  2. One static route to Azure Lambda IP address.
  3. Two static routes to Azure probe IP address.
  4. Two BGP routes to Azure probe IP address.

Answer(s): C



Your DevOps team is evaluating different Infrastructure as Code (IaC) solutions for deploying complex Azure environments.
What is an advantage of choosing Azure Bicep over other IaC tools available?

  1. Azure Bicep generates deployment logs that are optimized to improve error handling.
  2. Azure Bicep provides immediate support for all Azure services, including those in preview.
  3. Azure Bicep requires less frequent schema updates than Azure Resource Manager (ARM) templates.
  4. Azure Bicep can reduce deployment costs by limiting resource utilization during testing.

Answer(s): B



You must add an Amazon Web Services (AWS) network access list (NACL) rule to allow SSH traffic to a subnet for temporary testing purposes.
When you review the current inbound and outbound NACL rules, you notice that the rules with number 5 deny SSH and Telnet traffic to the subnet.
What can you do to allow SSH traffic?

  1. You do not have to create any NACL rules because the default security group rule automatically allows SSH traffic to the subnet.
  2. You must create a new allow SSH rule anywhere in the network ACL rule base to allow SSH traffic.
  3. You must create two new allow SSH rules, each with a number bigger than 5.
  4. You must create two new allow SSH rules, each with a number smaller than 5.

Answer(s): D



Refer to the exhibit.



Refer to the exhibit.
After the initial Terraform configuration in Microsoft Azure, the terraform plan command is run.
Which two statements about running the terraform plan command are true? (Choose two.)

  1. The terraform plan command will deploy the rest of the resources except the service principal details.
  2. You cannot run the terraform apply command before the terraform plan command.
  3. The terraform plan command makes Terraform do a dry run.
  4. You must run the terraform init command once, before the terraform plan command.

Answer(s): C,D



A network security administrator is searching for a solution to secure traffic going in and out of the container infrastructure.
In which two ways can Fortinet container security help secure container infrastructures? (Choose two.)

  1. FortiGate NGFW can inspect north-south container traffic with label-aware policies.
  2. FortiGate NGFW and FortiWeb can be used to secure container traffic.
  3. FortiGate NGFW can connect to the worker nodes and protect the containers.
  4. FortiGate NGFW can be placed between each application container for north-south traffic inspection.

Answer(s): A,B



An organization is deploying FortiDevSec to enhance security for containerized applications, and they need to ensure containers are monitored for suspicious behavior at runtime.
Which FortiDevSec feature is best for detecting runtime threats?

  1. FortiDevSec Software Composition Analysis (SCA)
  2. FortiDevSec Static Application Security Testing (SAST)
  3. FortiDevSec Dynamic Application Security Testing (DAST)
  4. FortiDevSec Container Scanner

Answer(s): D



Viewing Page 1 of 6



Share your comments for Fortinet FCSS_CDS_AR-7.6 exam with other users:

Raviraj Magadum 1/12/2024 11:39:00 AM

practice test
INDIA


sivaramakrishnan 7/27/2023 8:12:00 AM

want the dumps for emc content management server programming(cmsp)
Anonymous


Aderonke 10/23/2023 1:52:00 PM

brilliant and helpful
UNITED KINGDOM


Az 9/16/2023 2:43:00 PM

q75. azure files is pass
SWITZERLAND


ketty 11/9/2023 8:10:00 AM

very helpful
Anonymous


Sonail 5/2/2022 1:36:00 PM

thank you for these questions. it helped a lot.
UNITED STATES


Shariq 7/28/2023 8:00:00 AM

how do i get the h12-724 dumps
Anonymous


adi 10/30/2023 11:51:00 PM

nice data dumps
Anonymous


EDITH NCUBE 7/25/2023 7:28:00 AM

answers are correct
SOUTH AFRICA


Raja 6/20/2023 4:38:00 AM

good explanation
UNITED STATES


BigMouthDog 1/22/2022 8:17:00 PM

hi team just want to know if there is any update version of the exam 350-401
AUSTRALIA


francesco 10/30/2023 11:08:00 AM

helpful on 2017 scrum guide
EUROPEAN UNION


Amitabha Roy 10/5/2023 3:16:00 AM

planning to attempt for the exam.
Anonymous


Prem Yadav 7/29/2023 6:20:00 AM

pleaseee upload
INDIA


Ahmed Hashi 7/6/2023 5:40:00 PM

thanks ly so i have information cia
EUROPEAN UNION


mansi 5/31/2023 7:58:00 AM

hello team, i need sap qm dumps for practice
INDIA


Jamil aljamil 12/4/2023 4:47:00 AM

it’s good but not senatios based
UNITED KINGDOM


Cath 10/10/2023 10:19:00 AM

q.119 - the correct answer is b - they are not captured in an update set as theyre data.
VIET NAM


P 1/6/2024 11:22:00 AM

good matter
Anonymous


surya 7/30/2023 2:02:00 PM

please upload c_sacp_2308
CANADA


Sasuke 7/11/2023 10:30:00 PM

please upload the dump. thanks very much !!
Anonymous


V 7/4/2023 8:57:00 AM

good questions
UNITED STATES


TTB 8/22/2023 5:30:00 AM

hi, could you please update the latest dump version
Anonymous


T 7/28/2023 9:06:00 PM

this question is keep repeat : you are developing a sales application that will contain several azure cloud services and handle different components of a transaction. different cloud services will process customer orders, billing, payment, inventory, and shipping. you need to recommend a solution to enable the cloud services to asynchronously communicate transaction information by using xml messages. what should you include in the recommendation?
NEW ZEALAND


Gurgaon 9/28/2023 4:35:00 AM

great questions
UNITED STATES


wasif 10/11/2023 2:22:00 AM

its realy good
UNITED ARAB EMIRATES


Shubhra Rathi 8/26/2023 1:12:00 PM

oracle 1z0-1059-22 dumps
Anonymous


Leo 7/29/2023 8:48:00 AM

please share me the pdf..
INDIA


AbedRabbou Alaqabna 12/18/2023 3:10:00 AM

q50: which two functions can be used by an end user when pivoting an interactive report? the correct answer is a, c because we do not have rank in the function pivoting you can check in the apex app
GREECE


Rohan Limaye 12/30/2023 8:52:00 AM

best to practice
Anonymous


Aparajeeta 10/13/2023 2:42:00 PM

so far it is good
Anonymous


Vgf 7/20/2023 3:59:00 PM

please provide me the dump
Anonymous


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous


CiscoStudent 11/15/2023 5:29:00 AM

in question 272 the right answer states that an autonomous acces point is "configured and managed by the wlc" but this is not what i have learned in my ccna course. is this a mistake? i understand that lightweight aps are managed by wlc while autonomous work as standalones on the wlan.
Anonymous