Fortinet NSE7_CDS_AR-7.6 Exam (page: 1)
Fortinet NSE 7 - Public Cloud Security 7.6.4 Architect
Updated on: 19-Feb-2026

Viewing Page 1 of 8

An administrator would like to use FortiCNP to keep track of sensitive data files located in the Amazon Web Services (AWS) S3 bucket and protect it from malware.
Which FortiCNP feature should the administrator use?

  1. FortiCNP Threat Detection policies
  2. FortiCNP Risk Management policies
  3. FortiCNP Data Scan policies
  4. FortiCNP Compliance policies

Answer(s): C

Explanation:

https://docs.fortinet.com/document/forticnp/22.4.a/online-help/359537/anti-virus-scan-policy



You are using Ansible to modify the configuration of several FortiGate VMs.
What is the minimum number of files you need to create, and in which file should you configure the target FortiGate IP addresses?

  1. One playbook file for each target and the required tasks, and one inventory file.
  2. One .yaml file with the targets IP addresses, and one playbook file with the tasks.
  3. One inventory file for each target device, and one playbook file.
  4. One text file for all target devices, and one playbook file.

Answer(s): D

Explanation:

Comprehensive and Detailed Explanation From FortiOS 7.6, FortiWeb 7.4 Exact Extract study guide:

Based on the FortiOS 7.6 Automation Guide and the provided documentation for Ansible workflows, the following structure is required for managing multiple FortiGate nodes:

Inventory File (The Target List): The inventory is a single file that defines the list of managed nodes. It specifies critical information such as hostnames, connection details, and specifically the IP addresses of the target devices. According to the study guide, this inventory is a text file that lists all the systems you want to manage.

Playbook File (The Task List): You create and edit a separate file that acts as the playbook. This file is written in YAML format and contains the series of tasks that Ansible performs on the managed nodes to reach a desired state.

Minimum File Count: A basic Ansible workflow consists of exactly two files: one inventory file (text) and one playbook file (YAML). By listing the target IP address (e.g., 10.0.206.131) within the inventory text file, the administrator can manage the FortiGate device without needing individual files for every target.

Why other options are incorrect:

Option A & C: Creating a separate playbook or inventory file for each target is inefficient and contradicts the core Ansible workflow, which uses a single inventory to manage multiple hosts.

Option B: While the playbook is a .yaml file, the study guide specifically defines the inventory (where IP addresses are configured) as a text file in the context of the basic workflow.



Refer to the exhibit.



The exhibit shows an active-passive high availability FortiGate pair with external and internal Azure load balancers There is no SDN connector used in this solution.

Which configuration must the administrator implement on each FortiGate?

  1. Single BGP route to Azure probe IP address.
  2. One static route to Azure Lambda IP address.
  3. Two static routes to Azure probe IP address.
  4. Two BGP routes lo Azure probe IP address.

Answer(s): C



Your DevOps team is evaluating different Infrastructure as Code (IaC) solutions for deploying complex Azure environments.

What is an advantage of choosing Azure Bicep over other IaC tools available?

  1. Azure Bicep generates deployment logs that are optimized to improve error handling.
  2. Azure Bicep provides immediate support for all Azure services, including those in preview.
  3. Azure Bicep requires less frequent schema updates than Azure Resource Manager (ARM) templates.
  4. Azure Bicep can reduce deployment costs by limiting resource utilization during testing.

Answer(s): B



You must add an Amazon Web Services (AWS) network access list (NACL) rule to allow SSH traffic to a subnet for temporary testing purposes.
When you review the current inbound and outbound NACL rules, you notice that the rules with number 5 deny SSH and telnet traffic to the subnet.

What can you do to allow SSH traffic?

  1. You do not have to create any NACL rules because the default security group rule automatically allows SSH traffic to the subnet.
  2. You must create a new allow SSH rule anywhere in the network ACL rule base to allow SSH traffic.
  3. You must create two new allow SSH rules, each with a number bigger than 5.
  4. You must create two new allow SSH rules, each with a number smaller than 5.

Answer(s): D



Refer to the exhibit.



After the initial Terraform configuration in Microsoft Azure, the terraform plan command is run.

Which two statements about running the terraform plan command are true? (Choose two.)

  1. The terraform plan command will deploy the rest of the resources except the service principle details.
  2. You cannot run the terraform apply command before the terraform plan command.
  3. The terraform plan command makes terraform do a dry run.
  4. You must run the terraform init command once, before the terraform plan command.

Answer(s): C,D



A Network security administrator is searching for a solution to secure traffic going in and out of the container infrastructure.

In which two ways can Fortinet container security help secure container infrastructures? (Choose two.)

  1. FortiGate NGFW can inspect north-south container traffic with label aware policies.
  2. FortiGate NGFW and FortiWeb can be used to secure container traffic.
  3. FortiGate NGFW can connect to the worker nodes and protect the containers.
  4. FortiGate NGFW can be placed between each application container for north-south traffic inspection.

Answer(s): A,B



An organization is deploying FortiDevSec to enhance security for containerized applications, and they need to ensure containers are monitored for suspicious behavior at runtime.

Which FortiDevSec feature is best for detecting runtime threats?

  1. FortiDevSec software composition analysis (SCA)
  2. FortiDevSec static application security testing (SAST)
  3. FortiDevSec dynamic application security testing (DAST)
  4. FortiDevSec container scanner

Answer(s): D



Viewing Page 1 of 8



Share your comments for Fortinet NSE7_CDS_AR-7.6 exam with other users:

sam 7/17/2023 6:22:00 PM

cannot evaluate yet
Anonymous


nutz 7/20/2023 1:54:00 AM

a laptops wireless antenna is most likely located in the bezel of the lid
UNITED STATES


rajesh soni 1/17/2024 6:53:00 AM

good examplae to learn basic
INDIA


Tanya 10/25/2023 7:07:00 AM

this is useful information
Anonymous


Nasir Mahmood 12/11/2023 7:32:00 AM

looks usefull
Anonymous


Jason 9/30/2023 1:07:00 PM

question 81 should be c.
CANADA


TestPD1 8/10/2023 12:22:00 PM

question 18 : response isnt a ?
EUROPEAN UNION


ally 8/19/2023 5:31:00 PM

plaese add questions
TURKEY


DIA 10/7/2023 5:59:00 AM

is dumps still valid ?
FRANCE


Annie 7/7/2023 8:33:00 AM

thanks for this
EUROPEAN UNION


arnie 9/17/2023 6:38:00 AM

please upload questions
Anonymous


Tanuj Rana 7/22/2023 2:33:00 AM

please upload the question dump for professional machinelearning
Anonymous


Future practitioner 8/10/2023 1:26:00 PM

question 4 answer is c. this site shows the correct answer as b. "adopt a consumption model" is clearly a cost optimization design principle. looks like im done using this site to study!!!
Anonymous


Ace 8/3/2023 10:37:00 AM

number 52 answer is d
UNITED STATES


Nathan 12/17/2023 12:04:00 PM

just started preparing for my exam , and this site is so much help
Anonymous


Corey 12/29/2023 5:06:00 PM

question 35 is incorrect, the correct answer is c, it even states so: explanation: when a vm is infected with ransomware, you should not restore the vm to the infected vm. this is because the ransomware will still be present on the vm, and it will encrypt the files again. you should also not restore the vm to any vm within the companys subscription. this is because the ransomware could spread to other vms in the subscription. the best way to restore a vm that is infected with ransomware is to restore it to a new azure vm. this will ensure that the ransomware is not present on the new vm.
Anonymous


Rajender 10/18/2023 3:54:00 AM

i would like to take psm1 exam.
Anonymous


Blessious Phiri 8/14/2023 9:53:00 AM

cbd and pdb are key to the database
SOUTH AFRICA


Alkaed 10/19/2022 10:41:00 AM

the purchase and download process is very much streamlined. the xengine application is very nice and user-friendly but there is always room for improvement.
NETHERLANDS


Dave Gregen 9/4/2023 3:17:00 PM

please upload p_sapea_2023
SWEDEN


Sarah 6/13/2023 1:42:00 PM

anyone use this? the question dont seem to follow other formats and terminology i have been studying im getting worried
CANADA


Shuv 10/3/2023 8:19:00 AM

good questions
UNITED STATES


Reb974 8/5/2023 1:44:00 AM

hello are these questions valid for ms-102
CANADA


Mchal 7/20/2023 3:38:00 AM

some questions are wrongly answered but its good nonetheless
POLAND


Sonbir 8/8/2023 1:04:00 PM

how to get system serial number using intune
Anonymous


Manju 10/19/2023 1:19:00 PM

is it really helpful to pass the exam
Anonymous


LeAnne Hair 8/24/2023 12:47:00 PM

#229 in incorrect - all the customers require an annual review
UNITED STATES


Abdul SK 9/28/2023 11:42:00 PM

kindy upload
Anonymous


Aderonke 10/23/2023 12:53:00 PM

fantastic assessment on psm 1
UNITED KINGDOM


SAJI 7/20/2023 2:51:00 AM

56 question correct answer a,b
Anonymous


Raj Kumar 10/23/2023 8:52:00 PM

thank you for providing the q bank
CANADA


piyush keshari 7/7/2023 9:46:00 PM

true quesstions
Anonymous


B.A.J 11/6/2023 7:01:00 AM

i can“t believe ms asks things like this, seems to be only marketing material.
Anonymous


Guss 5/23/2023 12:28:00 PM

hi, could you please add the last update of ns0-527
Anonymous