Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet FCSS_LED_AR-7.6 Fortinet NSE 6 - LAN Edge 7.6 Architect Exam Practice Test

Fortinet NSE 6 - LAN Edge 7.6 Architect Questions and Answers

Question 1

When the MAC address of a device is placed in quarantine on FortiSwitch, what happens to its egress traffic?

Options:

A.

Traffic is sent to an access VLAN.

B.

Traffic is assigned to the native VLAN.

C.

Traffic is sent as untagged traffic.

D.

Traffic is sent to an allowed VLAN.

Question 2

Refer to the exhibits.

Question # 2

Question # 2

Examine the FortiManager configuration and FortiGate CLI output shown in the exhibit.

The NAC feature is being tested with a device connected to port2 on managed FortiSwitch S224SPTF19005867. The NAC policy has been applied to port2, and traffic was generated from the test device. However, the traffic from the test device does not match the NAC policy and remains in the onboarding VLAN.

What are two possible reasons why the test device is not being correctly classified by the NAC policy? (Choose two.)

Options:

A.

Device detection is not enabled on VLAN 4089.

B.

The device operating system detected by FortiGate is not Linux.

C.

Management communication between FortiGate and FortiSwitch is down.

D.

The MAC address configured on the NAC policy is incorrect.

Question 3

How can FortiAIOps help optimize network performance in an SD-Branch deployment with FortiGate, FortiSwitch, and FortiAP?

Options:

A.

It disables low-performing APs and switches automatically.

B.

It uses Al-driven analytics to identify network issues and provide optimization recommendations.

C.

It removes the need for SD-WAN configuration by automating all routing decisions.

D.

It predicts and resolves all network issues without any human intervention.

Question 4

Refer to the exhibits.

Question # 4

Question # 4

A FortiSwitch is successfully managed by a FortiGate. FortiAP is connected to port1 of the managed FortiSwitch. On FortiGate, the VLAN AP is configured to detect and manage FortiAP, along with a DHCP server for the VLAN AP. Additionally, the VLAN AP is assigned to port1 of FortiSwitch. However. FortiGate is unable to detect or manage FortiAP.

Which FortiGate misconfiguration is preventing the detection of FortiAP?

Options:

A.

Security Fabric is disabled in the administrative access options of the VLAN.

B.

The FortiAP firmware is incompatible with the FortiGate firmware version.

C.

The VLAN is not tagged correctly on the FortiSwitch uplink port.

D.

The CAPWAP ports (UDP 5246 and 5247) are not open on FortiGate.

Question 5

APs have been manually configured to connect to FortiGate over an IPsec network, and FortiGate successfully detects and authorizes them. However, the APs remain unmanaged because FortiGate is unable to establish a CAPWAP tunnel with them.

What configuration change can resolve this issue and enable FortiGate to establish the CAPWAP tunnel over the IPsec connection?

Options:

A.

Configure a static route on FortiGate to reach the APs over the IPsec tunnel.

B.

Assign a custom AP profile for the remote APs with the set mpls-connection option enabled.

C.

Decrease the CAPWAP tunnel MTU size for APs to prevent fragmentation.

D.

Upgrade the FortiAP firmware image to ensure compatibility with the FortiOS version.

Question 6

A network administrator connects a new FortiGate to the network, allowing it to automatically discover andI register with FortiManager.

What occurs after FortiGate retrieves the FortiManager address?

Options:

A.

FortiGate establishes a secure tunnel to FortiManager over TCP port 541.

B.

The device needs to be manually authorized on FortiManager.

C.

FortiGate configures its interface settings based on a DHCP response from FortiManager.

D.

FortiGate sends a discovery request to all devices on the local network using UDP port 1068.

Question 7

You are setting up a captive portal to provide Wi-Fi access for visitors. To simplify the process, your team wants visitors to authenticate using their existing social media accounts instead of creating new accounts or entering credentials manually.

Which two actions are required to enable this functionality? (Choose two.)

Options:

A.

Set up a remote open authorization (OAuth) server for each selected social media platform.

B.

Configure only the email login option because a social media login cannot be used with captive portals.

C.

Enable Account Login as the authentication type and configure a remote LDAP server.

D.

Set up the FortiAuthenticator internal database as the primary source for user credentials.

E.

Configure the social login profiles for the supported platforms.

Question 8

Refer to the exhibit.

Question # 8

Which shows the WTP profile configuration.

The AP profile is assigned to two FAP-231F APs that are installed in an open plan area.

The first AP has 32 clients associated with the 5 GHz radios and 22 clients associated with the 2.4 GHz radio. The second AP has 12 clients associated with the 5 GHz radios and 20 clients associated with the 2.4 GHz radio.

A dual-band-capable client enters the area near the first AP and the first AP measures the new client at - 3 3 dBm signal strength. The second AP measures the new client at -43 dBm signal strength.

If the new client attempts to conned to the student 01 wireless network, which AP radio will the client be associated with?

Options:

A.

The first AP 2.4 GHz interface provides a stronger signal, which clients often prioritize.

B.

The first AP 5 GHz interface because it has a stronger signal.

C.

The second AP 5 GHz interface has fewer clients, which ensures better performance despite the weaker signal.

D.

The second AP 2.4 GHz interface is preferred over 5 GHz for better speed and lower interference.

Question 9

Refer to the exhibits.

Question # 9

Question # 9

Examine the FortiGate configuration, FortiAnalyzer logs, and FortiGate widget shown in the exhibits.

Security Fabhc quarantine automation has been configured to isolate compromised devices automatically. FortiAnalyzer has been added to the Security Fabric, and an automation stitch has been configured to quarantine compromised devices.

To test the setup, a device with the IP address 10.0.2.1 that is connected through a managed FortiSwitch attempts to access a malicious website. The logs on FortiAnalyzer confirm that the event was recorded, but the device does not appear in the FortiGate quarantine widget.

Which two reasons could explain why FortiGate is not quarantining the device? (Choose two.)

Options:

A.

The IOC action should include only the FortiSwitch in the quarantine.

B.

The SSL inspection should be set to deep-Inspection

C.

The malicious website is not recognized as an indicator of compromise (IOC) by FortiAnalyzer.

D.

The threat detection services license is missing or invalid under FortiAnalyzer.

Question 10

Which statement about generating a certificate signing request (CSR) for a CER certificate is true?

Options:

A.

Inaccurate or missing fields in the CSR will prevent the CA from validating the request, leading to the rejection of the certificate and possible delays in the deployment process.

B.

If key fields like the common name (CN) and organization (O) are incorrect, the certification authority (CA) will still issue the certificate, but it may not be trusted by certain applications or systems that rely on accurate field information for validation.

C.

CSR fields are primarily used for internal recordkeeping by the requesting organization, and only the public key in the CSR must be accurate for successful certificate signing.

D.

The fields in the CSR are primarily for documentation purposes; any missing or incorrect information will be automatically corrected by the CA during the signing process.

Question 11

Refer to the exhibits.

Question # 11

Question # 11

Examine the FortiGate RSSO configuration shown in the exhibit.

FortiGate is set up to use RSSO for user authentication. It is currently receiving RADIUS accounting messages through port3. The incoming RADIUS accounting messages contain the username in the User-Name attribute and group membership in the Class attribute. You must ensure that the users are authenticated through these RADIUS accounting messages and accurately mapped to their respective RSSO user groups.

Which three critical configurations must you implement on the FortiGate device? (Choose three.)

Options:

A.

The RADIUS Attribute Value setting configured for an RSSO user group should match the class RADIUS attribute value in the RADIUS accounting message.

B.

RSSO user groups should be assigned to all firewall policies.

C.

Device detection and Security Fabric Connection should be enabled on port3

D.

The sso-attribute CLI setting in the RSSO agent configuration should be set to Class.

E.

The rsso-endpoint-attribute CLI setting in the RSSO agent configuration should be set to User-Name.

Question 12

Refer to the exhibits to analyze a network topology and SSID settings.

Question # 12

Question # 12

Question # 12

FortiGate is configured to use an external captive portal for authentication to grant access to a wireless network. Testing detected that users attempting to access the SSID are not able to access the captive portal login page. Which configuration change should fix this issue?

Options:

A.

Change the SSID security mode to WPA2-Enterprise for authentication.

B.

Firewall policy with the ID 13 must have NAT disabled.

C.

Address objects FortiAuthenticator and WindowsAD must be included as exempt destinations/services.

D.

A firewall policy with port4 as source is missing.

Question 13

Refer to the exhibits.

Question # 13

Question # 13

Question # 13

Which include debug output and SSL VPN configuration details.

An SSL VPN has been configured on FortiGate. To enhance security, the administrator enabled Required Client Certificate in the SSL VPN settings. However, when a user attempts to connect, authentication fails.

Which configuration change is needed to fix the issue and allow the user to connect?

Options:

A.

Enable Redirect HTTP to SSL-VPN on the SSL VPN configuration page.

B.

Import the CA that signed the SSL VPN Server Certificate to FortiGate.

C.

Set the user certificate as the Server Certificate on the SSL VPN configuration page.

D.

Import the CA that signed the user certificate to FortiGate.

Question 14

Which VLAN is used by FortiGate to place devices that fail to match any configured NAC policies? CRSPAN

Options:

A.

NAC

B.

segment

C.

Quarantine

D.

Onboarding