- Home
- Fortinet
- Fortinet Network Security Expert
- NSE4_FGT_AD-7.6
- NSE4_FGT_AD-7.6 - Fortinet NSE 4 - FortiOS 7.6 Administrator
Fortinet NSE4_FGT_AD-7.6 Fortinet NSE 4 - FortiOS 7.6 Administrator Exam Practice Test
Fortinet NSE 4 - FortiOS 7.6 Administrator Questions and Answers
Which statement correctly describes NetAPI polling mode for the FSSO collector agent?
Options:
The collector agent uses a Windows API to query DCs for user logins.
The NetSessionEnum function is used to track user logouts.
NetAPI polling can increase bandwidth usage in large networks.
The collector agent must search Windows application event logs.
Answer:
BExplanation:
NetAPI: Polls temporary sessions created on the DC when a user logs on or logs off and calls the NetSessionEnum function on Windows. It’s faster than the WinSec and WMI methods; however, it can miss some logon events if a DC is under heavy system load. This is because sessions can be quickly created and purged form RAM, before the agent has a chance to poll and notify FG.
Refer to the exhibit.

What can you conclude from the log shown in the exhibit?
Options:
The IPS socket buffer is full and IPS engine needs more memory to create new sessions.
The IPS socket buffer is full and IPS engine cannot decode a packet.
The IPS scan is paused by the IPS diagnostic command with bypass mode option 5.
The IPS session scan is paused and reevaluating the packet because of a dirty flag.
Answer:
AExplanation:
“You can configure the fail-open setting under config ips global to control how the IPS engine behaves when the IPS socket buffer is full .”
“If the IPS engine does not have enough memory to build more sessions , the fail-open setting determines whether the FortiGate should drop the sessions or bypass the sessions without inspection .”
“It is important to understand that the IPS fail-open setting is not just for conserve mode—it kicks in whenever IPS fails. Most failures are due to a high CPU issue or a high memory (conserve mode) issue.”
Technical Deep Dive:
The correct answer is A .
The log text says:
logdesc= " IPS session scan paused "
action= " drop "
msg= " IPS session scan, enter fail open mode "
That combination indicates an IPS failure condition , specifically the condition described in the guide where the IPS socket buffer is full and the IPS engine lacks enough memory/resources to build additional sessions. In that state, FortiGate applies the configured IPS fail-open behavior . Since the log shows action= " drop " , the device is not bypassing those new sessions; it is dropping them.
Why the other choices are wrong:
B is wrong because the guide ties fail-open to socket buffer/resource exhaustion , not packet decode failure.
C is wrong because this is not evidence of a manual diagnostic pause.
D is wrong because the study guide does not associate this log with dirty-flag packet reevaluation.
Operationally, this usually points to high memory , high CPU , or conserve-mode pressure affecting the IPS engine. Useful checks are:
get system performance status
diagnose hardware sysinfo conserve
diagnose sys top
Those help confirm whether the IPS issue is being driven by memory pressure or CPU exhaustion.
What are two features of FortiGate FSSO agentless polling mode? (Choose two.)
Options:
FortiGate uses the AD server as the collector agent.
FortiGate uses the SMB protocol to read the event viewer logs from the DCs.
FortiGate does not support workstation check.
FortiGate directs the collector agent to use a remote LDAP server.
Answer:
B, CExplanation:
Based on the FortiOS 7.6 Administrator Guide regarding Fortinet Single Sign-On (FSSO) polling modes, the agentless polling mode has specific technical characteristics:
SMB Protocol Usage (Statement B is True):
In agentless polling mode, the FortiGate unit itself acts as the collector.
It establishes direct connections to the Windows Domain Controllers (DCs) using the SMB (Server Message Block) protocol, typically over TCP port 445, to read the Windows Security Event logs.
This allows FortiGate to parse login event IDs (such as 4768 and 4769) to identify users and their corresponding IP addresses without needing an external collector agent installed on a server.
Workstation Check Support (Statement C is True):
One of the primary limitations of the agentless polling mode compared to the agent-based mode is the lack of workstation verification.
In agentless mode, FortiGate does not perform " workstation checks " or " dead entry checks " . This means it cannot proactively verify if a user is still logged into a specific workstation after the initial logon event is recorded, which can lead to stale entries if a user logs off without a corresponding event being captured.
Why other options are incorrect:
Option A: In agentless mode, FortiGate (the FSSO daemon) performs the collection itself; it does not use the AD server as a " collector agent " in the functional sense of FSSO architecture.
Option D: While FortiGate uses LDAP to retrieve group membership information once a user is identified, it does not " direct " a collector agent to a remote LDAP server, as there is no external collector agent involved in this specific mode.
Refer to the exhibit.

Which two ways can you view the log messages shown in the exhibit? (Choose two.)
Options:
By right clicking the implicit deny policy
Using the FortiGate CLI command diagnose log test
By filtering by policy universally unique identifier (UUID) and application name in the log entry
In the Forward Traffic section
Answer:
C, DExplanation:
The exhibit shows a FortiGate UTM application control log with fields such as:
type= " utm "
subtype= " app-ctrl "
action= " block "
policyid=1
appid=30220
appcat= " Video/Audio "
service= " HTTP "
apprisk= " elevated "
This is a forward traffic security log, generated by Application Control applied to a firewall policy.
Why the correct answers are C and D
C. By filtering by policy universally unique identifier (UUID) and application name in the log entry
Correct.
FortiOS logs can be viewed and filtered in:
Log & Report → Forward Traffic
Administrators can filter logs using fields such as:
Policy ID / Policy UUID
Application name (app)
Application ID (appid)
The log entry clearly includes application-related fields, making filtering by policy and application a valid and documented way to view these logs.
D. In the Forward Traffic section
Correct.
The log is a UTM Application Control log for traffic passing through a firewall policy.
Such logs are displayed under:
Log & Report → Forward Traffic
This is the standard and correct location to view application control, web filter, IPS, and other security profile logs related to user traffic.
Why the other options are incorrect
A. By right clicking the implicit deny policy
Incorrect.
Implicit deny policies do not generate UTM forward traffic logs like the one shown.
Application control logs are generated only by explicit firewall policies with security profiles enabled.
B. Using the FortiGate CLI command diagnose log test
Incorrect.
diagnose log test is used to test log connectivity and log settings, not to view historical log entries.
It does not display traffic or UTM logs.
Which two components are part of the secure internet access (SIA) agent-based mode on FortiSASE? (Choose two.)
Options:
FortiSASE Firewall-as-a-Service (FWaaS)
The proxy auto-configuration (PAC) file
VPN policies
FortiExtender
Answer:
A, CExplanation:
In FortiSASE Secure Internet Access (SIA) agent-based mode, traffic steering and security enforcement rely on components integrated with the FortiClient agent.
Components used in SIA agent-based mode
A. FortiSASE Firewall-as-a-Service (FWaaS)
Correct.
FWaaS is a core security component of FortiSASE.
It enforces firewall policies, security inspection, and access control for agent-based users.
All user traffic tunneled by the agent is inspected by FWaaS.
C. VPN policies
Correct.
In agent-based mode, the FortiClient establishes a secure tunnel to FortiSASE.
VPN policies define:
Authentication
Access control
Traffic steering
These policies are fundamental to agent-based connectivity.
Why the other options are incorrect
B. Proxy auto-configuration (PAC) filePAC files are used in agentless or proxy-based modes, not agent-based SIA.
D. FortiExtenderFortiExtender is a WAN extension device and is unrelated to FortiSASE SIA agent-based architecture.
Refer to the exhibit.

The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile. An administrator must block access to download.com, which belongs to the Freeware and Software Downloads category. The administrator must also allow other websites in the same category. What are two solutions for satisfying the requirement? (Choose two answers)
Options:
Configure a static URL filter entry for download.com with Type and Action set to Wildcard and Block, respectively.
Configure a web override rating for download.com and select Malicious Websites as the subcategory.
Configure a separate firewall policy with action Deny and an FQDN address object for *.download.com as destination address.
Set the Freeware and Software Downloads category Action to Warning.
Answer:
A, BExplanation:
“In FortiOS, there are three main components of web filtering:
• Web content filtering...
• URL filtering: uses URLs and URL patterns to block or exempt web pages from specific sources ...
• FortiGuard Web Filtering service...”
“In the web filter profile, Fortiguard category filtering enhances the web filter features. Rather than block or allow websites individually, it looks at the category that a website has been rated with. Then, FortiGate takes action based on that category, not based on the URL.”
“If you consider that a particular URL does not have the correct category, you can ask to re-evaluate the rating in the Fortinet URL Rating Submission website. You can also override a web rating for an exceptional URL in the FortiGate configuration. ”
“Static URL filtering is another web filter feature, which provides more granularity. Configured URLs in the URL filter are checked from top to bottom against the visited websites. If FortiGate finds a match, it applies the configured action.”
“To find the exact match, URL filtering has three pattern types: Simple, Regular Expressions, and Wildcard .”
“So, with these different features, what is the inspection order? If you have enabled many of them, the inspection order flows as follows:
The local static URL filter
FortiGuard category filtering...”
Technical Deep Dive:
The correct answers are A and B .
A is correct because a static URL filter gives per-URL granularity. Since the category Freeware and Software Downloads is currently allowed in the profile, adding a local static URL filter entry for download.com with Block lets FortiGate deny only that site while continuing to allow the rest of the category. This also aligns with the documented inspection order, where the local static URL filter is checked before FortiGuard category filtering .
B is also correct because a web rating override can reclassify a specific exceptional URL. If download.com is re-rated into a blocked category such as Malicious Websites , it will be blocked by the profile while other sites in Freeware and Software Downloads remain allowed.
Why the others are wrong:
C is not the intended web-filter solution. A firewall policy with an FQDN object operates at policy/routing resolution level, not as a category-aware web filtering exception.
D is wrong because changing the whole category to Warning affects all sites in that category, not just download.com.
In production, the cleaner design is usually: keep the category allowed, then add a local URL-filter exception or a web-rating override for the specific site . For HTTPS traffic, remember FortiGate still needs enough SSL inspection visibility to identify the hostname correctly. A representative CLI approach for URL filtering is:
config webfilter urlfilter
edit 1
config entries
edit 1
set url " download.com "
set type wildcard
set action block
next
end
next
end
This is the most deterministic way to block one site without penalizing the rest of the category.
Refer to the exhibit to view the firewall policy.

Why would the firewall policy not block a well-known virus, for example EICAR? (Choose one answer)
Options:
The action on the firewall policy is not set to DENY.
Web filter is not enabled, so the firewall policy does not complement the antivirus profile.
The firewall policy is not configured in proxy-based inspection mode.
The firewall policy does not apply deep content inspection.
Answer:
DExplanation:
“The only security features you can apply using SSL certificate inspection mode are web filtering and application control... Note that while offering some level of security, certificate inspection does not allow FortiGate to inspect the flow of encrypted data.”
“To perform SSL inspection on traffic flowing through the FortiGate device, you must allow the traffic with a firewall policy and apply an SSL inspection profile to the policy... For antivirus or IPS control, you should use a deep-inspection profile.”
“When you use deep inspection, FortiGate impersonates the recipient of the originating SSL session, and then decrypts and inspects the content to find threats and block them. It then re-encrypts the content and sends it to the real recipient.”
Technical Deep Dive:
The exhibit shows that the policy is allowing HTTPS and the SSL/SSH inspection profile is certificate-inspection , not deep-inspection . That is the key issue. With certificate inspection, FortiGate can inspect only SSL metadata such as the certificate and SNI/hostname context; it cannot decrypt the HTTPS payload itself. Because EICAR is detected by antivirus through payload inspection, FortiGate must see the file contents. Without deep SSL inspection, the antivirus engine never gets the decrypted payload, so the file can pass even though the antivirus profile is attached.
Option A is incorrect because FortiGate firewall policies often use ACCEPT + security profile enforcement ; the session can still be blocked by antivirus after policy match. Option B is incorrect because web filter is not required for antivirus detection. Option C is incorrect because the real requirement is deep SSL inspection , not specifically proxy-based mode; full SSL inspection is the deciding factor here.
In practice, to block EICAR over HTTPS, you would apply a deep-inspection SSL profile to the policy, for example:
config firewall policy
edit < policy-id >
set inspection-mode flow
set av-profile " default "
set ssl-ssh-profile " deep-inspection "
next
end
On real hardware, this also matters for performance design. Simple firewall/NAT sessions are often NP fast-pathed, but once you enable deep SSL inspection and content scanning, traffic is typically handed to CPU/WAD/content-inspection path for decryption and scanning, so throughput is lower than certificate-inspection or no-inspection.
Which three methods are used by the collector agent for AD polling? (Choose three answers)
Options:
NetAPI
WMI
WinSecLog
DNS reverse lookup
FSSO REST API
Answer:
A, B, CExplanation:
“As previously stated, collector agent-based polling mode has three methods (or options) for collecting login information. The order on the slide from left to right shows most recommend to least recommended:
• WMI ...
• WinSecLog ...
• NetAPI ...”
Technical Deep Dive:
The correct three AD polling methods are WMI, WinSecLog, and NetAPI . These are the collector-agent polling options FortiGate FSSO uses against Windows domain controllers. WMI is generally the most efficient because the DC returns requested login events directly. WinSecLog polls Windows Security Event Logs and is typically more reliable than NetAPI for not missing recorded logons. NetAPI can be faster, but it is more prone to missing events under load because it depends on temporary session information rather than persistent security logs.
Why the other options are wrong:
DNS reverse lookup is not one of the three AD polling methods. DNS is used by FSSO to resolve workstation names to IP addresses and to track IP changes, but it is not itself a polling method for collecting AD logon events. FSSO REST API is also not one of the documented collector-agent AD polling methods in the study guide.
From an operational standpoint, FSSO login collection and workstation verification are separate functions. The collector agent may still rely on DNS and workstation checks after a login is learned, but the actual AD polling methods remain only WMI, WinSecLog, and NetAPI . On a FortiGate, when troubleshooting FSSO behavior, you would typically validate the collector feed and user cache with commands such as:
diagnose debug authd fsso list
diagnose debug authd fsso server-status
Those commands help confirm whether the users gathered by the collector through one of those three polling methods are reaching FortiGate correctly.
Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity. What must the administrator configure to answer this specific request from the NOC team? (Choose one answer)
Options:
Move NOC_Access to the top of the list to ensure all profile settings take effect.
Increase the offline value of the Override Idle Timeout parameter in the NOC_Access admin profile.
Ensure that all NOC_Access users are assigned the super_admin role to guarantee access.
Increase the admintimeout value under config system accprofile NOC_Access.
Answer:
DExplanation:
According to the FortiOS 7.6 Administrator Study Guide, while there is a global administrative idle timeout setting that applies to all users by default (typically 5 minutes), FortiOS allows for granular control through Administrator Profiles . The Override Idle Timeout feature is specifically designed to allow different timeout values for different access profiles, which is ide 1 al for environments like a Network Operations Center (NOC) where persistent monitoring is required. 23
To implement this, the administrator must modify the s 4 pecific access profile settings. By using the command config system accprofile 5 and editing the NOC_Access profile, the administrator can enable the admintimeout-override and then increase the admintimeout value (Statement D). This configuration ensures that only the users assigned to that specific profile benefit from the extended session duration, maintaining a higher security posture for other administrative accounts that still follow the global timeout. Other options, such as changing the profile order (A) or assigning the super_admin role (C), do not address the specific requirement for inactivity timeout management. Option B is incorrect as " offline value " is not a standard parameter for this feature.
Which two statements about equal-cost multi-path (ECMP) configuration on FortiGate are true? (Choose two answers)
Options:
If SD-WAN is enabled, you control the load balancing algorithm with the parameter load-balance-mode.
If SD-WAN is disabled, you can configure the parameter v4-ecmp-mode to volume-based.
If SD-WAN is enabled, you can configure routes with unequal distance and priority values to be part of ECMP.
If SD-WAN is disabled, you configure the load balancing algorithm in config system settings.
Answer:
A, DExplanation:
“If SD-WAN is disabled, you can change the ECMP load balancing algorithm on the FortiGate CLI using the commands shown on this slide.”
“When SD-WAN is enabled, FortiOS hides the v4-ecmp-mode setting and replaces it with the load-balance-mode setting under config system sdwan . That is, when you enable SD-WAN, you control the ECMP algorithm with the load-balance-mode setting.”
“There are some differences between the two settings. The main difference is that load-balance-mode supports the volume algorithm, and v4-ecmp-mode does not .”
“These routes are called equal cost multipath (ECMP) routes...”
Technical Deep Dive:
The correct answers are A and D .
A is correct because when SD-WAN is enabled, FortiOS no longer uses v4-ecmp-mode; it uses load-balance-mode under config system sdwan. That is the explicit SD-WAN control point for ECMP behavior.
D is correct because when SD-WAN is disabled, ECMP configuration is done in the regular system routing settings, not under SD-WAN. The study guide states that you change the ECMP algorithm on the FortiGate CLI when SD-WAN is disabled, which corresponds to the classic config system settings ECMP controls.
Why the others are wrong:
B is wrong because the guide explicitly says load-balance-mode supports volume , while v4-ecmp-mode does not . So you cannot set v4-ecmp-mode to volume-based.
C is wrong because ECMP requires equal-cost routes. If distance or priority differ, they are no longer ECMP candidates; FortiGate selects the preferred route instead. The concept of ECMP itself requires equal route cost attributes.
From an implementation standpoint, the common CLI patterns are:
config system settings
set v4-ecmp-mode source-ip-based
end
and, with SD-WAN enabled:
config system sdwan
set load-balance-mode source-ip-based
end
On hardware platforms, ECMP still affects session distribution at the routing decision stage before later security services are applied. NP offload can accelerate forwarding after route selection, but the ECMP decision itself is a FortiOS control-plane routing function.
An administrator wants to form an HA cluster using the FGCP protocol. Both FortiGate devices are configured with the set override enable command. Arrange the criteria in the order in which the FGCP protocol uses them to elect the primary FortiGate. Select the criteria in the left column, hold and drag it to a blank position in the column on the right. Place the four correct steps in order, placing the first step in the first position. Once you place a step, you can move it again if you want to change your answer before moving to the next question. You need to drop four criteria in the work area. Select and drag the screen divider to change the viewable area of the source and work areas. (Choose four answers)

Options:
Answer:

Explanation:
“This slide shows the different criteria that a cluster considers during the primary FortiGate election process. The criteria order evaluation depends on the HA override setting.”
For the default case shown in the guide:
“1. The cluster compares the number of monitored interfaces that have a status of up. The member with the most available monitored interfaces becomes the primary.
2. The cluster compares the HA uptime of each member...
3. The member with the highest priority becomes the primary.
4. The member with the highest serial number becomes the primary.”
For this question’s case:
“If the HA override setting is enabled, the priority is considered before the HA uptime .”
Technical Deep Dive:
Because override is enabled , the election order changes from the default sequence. The first criterion is still Connected monitored ports , because interface health is evaluated first. After that, Priority moves ahead of HA uptime . If those still do not decide the winner, FortiGate uses the serial number as the final tie-breaker. Therefore the correct order is:
1. Connected monitored ports
2. Priority
3. HA uptime
4. FortiGate serial number
This distinction matters in production. With set override enable, you are effectively making HA priority authoritative over uptime, so the preferred unit will reclaim the primary role when it comes back online. That is useful for deterministic primary selection, but it can also cause an additional failover event when the preferred chassis returns to service. The guide explicitly notes this tradeoff.
In practice, the relevant HA checks and verification commands are:
show system ha
get system ha status
diagnose sys ha status
These let you confirm override status, device priority, monitored interfaces, and recent election results. From a control-plane perspective, FGCP election logic is handled by FortiOS over heartbeat links, while data-plane forwarding after election continues using the cluster’s virtual MAC behavior and synchronized HA state.
You have configured the below commands on a FortiGate.

What would be the impact of this configuration on FortiGate?
Options:
FortiGate will enable strict RPF on all its interfaces and porti will be exempted from RPF checks.
FortiGate will enable strict RPF on all its interfaces and porti will be enable for asymmetric routing.
The global configuration will take precedence and FortiGate will enable strict RPF on all interfaces.
Port1 will be enabled with flexible RPF. and all other interfaces will be enabled for strict RPF
Answer:
AWhich three strategies are valid SD-WAN rule strategies for member selection? (Choose three answers)
Options:
Lowest Cost (SLA) without load balancing
Manual with load balancing
Lowest Quality (SLA) with load balancing
Lowest Cost (SLA) with load balancing
Best Quality with load balancing
Answer:
A, B, DExplanation:
According to the FortiOS 7.6 Administrator Study Guide and official documentation, SD-WAN rules (services) determine the path selection for traffic matching specific criteria. Version 7.6 provides specific flexibility regarding how these strategies handle multiple member interfaces.
First, Manual with load balancing (Statement B) is a valid configuration. In the Manual strategy, the administrator orders interfaces by preference, but by enabling the Load balancing toggle, the FortiGate can distribute traffic across all members that are up.
Second, the Lowest Cost (SLA) strategy has been enhanced to support two modes. When the load balancing option is disabled, it acts as Lowest Cost (SLA) without load balancing (Statement A), selecting the single lowest-cost link that meets the SLA. Alternatively, by enabling the toggle, it functions as Lowest Cost (SLA) with load balancing (Statement D), where the FortiGate distributes traffic across all interfaces that satisfy the SLA target, regardless of their individual costs.
Statements C and E are incorrect because " Lowest Quality " is not a recognized SD-WAN strategy, and the Best Quality strategy is specifically a priority-based selection for a single " best " link, meaning the load balancing toggle is not available in the GUI when this mode is selected.
Refer to the exhibit.

The NOC team connects to the FortiGate GUI with the NOC_Access admin profile. They request that their GUI sessions do not disconnect too early during inactivity. What must the administrator configure to answer this specific request from the NOC team?
Options:
Increase the admintimeout value under config system accprofile noc Access.
increase the of line value of the override idle Timeout parameter in the NOC_Access admin profile.
Move NOC_Access to the top of the list to ensure all profile settings take effect.
Ensure that all NOC_Access users are assigned the super_admin role to guarantee access.
Answer:
BExplanation:
In FortiOS 7.6, GUI session inactivity timeout behavior for administrators is controlled by admin profiles, not by general access permissions or profile ordering.
How GUI idle timeout works in FortiOS 7.6
FortiGate has a global admin timeout (admintimeout), but
Admin profiles can override this value using the Override idle timeout setting.
When Override idle timeout is enabled in an admin profile, the timeout value defined inside that profile takes precedence over the global setting.
The exhibit shows that the NOC team logs in using the NOC_Access admin profile. Therefore, to prevent their GUI sessions from disconnecting too quickly during inactivity, the timeout must be adjusted within that specific admin profile.
Why option B is correct
B. Increase the value of the Override Idle Timeout parameter in the NOC_Access admin profile.
This directly controls how long GUI sessions remain active when users assigned to NOC_Access are idle.
It affects only the NOC team, which matches the requirement precisely.
This is the recommended and documented approach in FortiOS 7.6.
Why the other options are incorrect
A. Increase admintimeout under config system accprofileIncorrect. admintimeout is a global admin setting, not configured under accprofile, and it would affect all administrators, not just NOC users.
C. Move NOC_Access to the top of the listIncorrect. Admin profile order has no impact on session timeout behavior.
D. Assign super_admin roleIncorrect and insecure. Super_admin does not control idle timeout and would unnecessarily grant full privileges.
Which two statements are true about an HA cluster? (Choose two answers)
Options:
An HA cluster cannot have both in-band and out-of-band management interfaces at the same time.
Link failover triggers a failover if the administrator sets the interface down on the primary device.
When sniffing the heartbeat interface, the administrator must see the IP address 169.254.0.2.
HA incremental synchronization includes FIB entries and IPsec SAs.
Answer:
B, DExplanation:
According to FortiOS 7.6 High Availability documentation, the FortiGate Cluster Protocol (FGCP) provides robust mechanisms for both link monitoring and stateful data synchronization. Link failover is a primary trigger for cluster renegotiation; if a monitored interface goes down—including when an administrator manually sets the interface to administratively down —the primary unit ' s priority is effectively reduced, triggering a failover to a secondary unit to ensure path continuity. 5 This is a standard method for testing HA failover behavior.
Furthermore, to achieve a seamless stateful failover where active sessions are not dropped, the FortiGate performs incremental synchronization of critical runtime data. 6 This specifically includes Forwarding Information Base (FIB) entries, which represent the compiled routing table, and IPsec Security Associations (SAs) . 7 By synchronizing IPsec SAs, the secondary unit 8 can resume encrypted tunnels immediately after a failover without requiring a f 9 ull IKE re-negotiation. 10 Statement A is incorrect because in-band and out-of-band management can coexist using reserved management interfaces and management-ip settings. 11 Statement C is incorrect because while heartbeat interfaces use link-local IPs in the 169.254.0.x range, the specific IP .2 is not universally required for all heartbeats and depends on the number of cluster members and serial numbers.
Refer to the exhibits.



A diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device are shown.
Two PCs. PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.
Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)
Options:
In the system settings, set Multiple Interface Policies to enable.
in the IP pool configuration, set end ipto 100.65.0.112.
In the firewall policy, set match-vip to enable using CLI.
In the IP pool configuration, set type to overload.
Answer:
B, DExplanation:
From the exhibits:
The firewall policy has NAT enabled and is configured to Use Dynamic IP Pool.
The selected IP pool (Internet-pool) is configured as:
Type: One-to-One
External IP Range: 100.65.0.110–100.65.0.111 (only two public IPs)
PC1 and PC2 can access the internet because each one-to-one NAT mapping consumes one public IP from the pool. When PC3 is added, there is no third public IP available in the pool, so FortiGate cannot allocate a one-to-one mapping for PC3 and the session fails.
FortiOS behavior here is standard: with one-to-one IP pools, the available pool size limits how many distinct internal sources can be translated concurrently (depending on allocation and sessions), and a pool with only two IPs will not reliably support three separate hosts needing translations.
Therefore, the administrator can fix this in two valid ways:
B. In the IP pool configuration, set end ip to 100.65.0.112.
This expands the pool by adding an additional public IP address, making three public IPs available (.110, .111, .112), so PC3 can be assigned an address for one-to-one NAT.
D. In the IP pool configuration, set type to overload.
Changing the pool type to overload enables PAT (many-to-one), allowing multiple internal hosts (PC1, PC2, PC3) to share the pool address(es) using different source ports. This removes the “one public IP per internal host” limitation inherent to one-to-one pools.
Why the other options are not correct:
A. Multiple Interface Policies is unrelated to IP pool exhaustion and does not solve NAT allocation limits.
C. match-vip affects VIP matching behavior for destination NAT/virtual IP usage and does not address the source NAT pool shortage causing PC3 to fail.
An administrator has configured a dialup IPsec VPN on FortiGate with add-route enabled. However, the static route is not showing in the routing table. Which two statements about this scenario are correct? (Choose two.)
Options:
The administrator must use a policy route instead of a static route for add-route to work properly.
The administrator must ensure phase 2 is successfully established
The administrator must define the remote network correctly in the phase 2 selectors.
The administrator must enable a dynamic routing protocol on the dialup interface.
Answer:
B, CExplanation:
With a dialup IPsec VPN on FortiGate, when add-route is enabled, FortiGate will only install the corresponding route when it has enough negotiated information from the tunnel. In FortiOS 7.6, that means the route is tied to the Phase 2 (Quick Mode) selectors and is created dynamically when the IPsec SA is actually up.
B. The administrator must ensure phase 2 is successfully established
This is required. FortiGate does not install the add-route route just because Phase 1 exists or because the configuration is present. The route is added when the tunnel is effectively usable, which requires Phase 2 (IPsec SA) to be up. If Phase 2 is not established, there is no active SA and FortiGate will not inject the related route into the routing table.
So, if the static route is not showing, one correct explanation is that Phase 2 is not up.
C. The administrator must define the remote network correctly in the phase 2 selectors
This is also required. For dialup tunnels, FortiGate derives what route to add from the remote subnet(s) defined in the Phase 2 selector (proxy ID). If the remote network in Phase 2 is missing, incorrect, or too broad/too narrow in a way that prevents negotiation, the tunnel either won’t come up (so no route), or the route that would be installed won’t match what the administrator expects.
So, another correct explanation is that the Phase 2 remote network is not correctly defined, preventing the correct route from being created.
Why the other options are incorrect
A. Policy route instead of a static route
Add-route does not require policy routes. It is specifically a feature that injects a route (route-table entry) associated with the IPsec tunnel/SA and the Phase 2 selector networks.
D. Enable a dynamic routing protocol
Dynamic routing protocols (OSPF/BGP/RIP) are not required for add-route. Add-route is independent of dynamic routing and works by installing routes locally based on the negotiated selectors.
Refer to the exhibit, which shows a partial configuration from the remote authentication server.

Why does the FortiGate administrator need this configuration? (Choose one answer)
Options:
To authenticate only the Training user group.
To set up a RADIUS server Secret.
To authenticate and match the Training OU on the RADIUS server.
To authenticate Any FortiGate user groups.
Answer:
AExplanation:
“With this method, you must create a user group and add the preconfigured remote server to the group. This setup allows you to select one or more pre-existing groups from the Radius server, enabling any user within those groups to be authenticated.”
“The response from the server reports success, failure, and group membership details.”
“Note that Fortinet has a vendor-specific attributes (VSA) dictionary to identify the Fortinet-proprietary RADIUS attributes. This capability allows you to extend the basic functionality of RADIUS.”
Technical Deep Dive:
The attribute shown in the exhibit is Fortinet-Group-Name = Training. This is a Fortinet RADIUS Vendor-Specific Attribute (VSA) used to return group membership information to FortiGate. FortiGate uses that returned value to match the authenticated user to the corresponding FortiGate user group, in this case Training.
That is why A is correct: the administrator needs this so FortiGate can authenticate users and place or match them into the Training group for identity-based policy control.
Why the others are wrong:
* B is wrong because the RADIUS secret is configured separately as the shared secret between FortiGate and the RADIUS server, not as a Fortinet-Group-Name attribute.
* C is wrong because OU matching is an LDAP concept, not standard RADIUS group matching.
* D is wrong because this attribute is not for “any” group; it is explicitly returning the specific group name Training.
In practice, this lets FortiGate apply firewall policies such as:
```bash
config user group
edit " Training "
set member " RADIUS_Server "
next
end
```
Then the RADIUS server returns Fortinet-Group-Name=Training, and FortiGate matches the user into that group for policy enforcement.
FortiGate is integrated with FortiAnalyzer and FortiManager.
When creating a firewall policy, which attribute must an administrator include to enhance functionality and enable log recording on FortiAnalyzer and FortiManager?
Options:
Universally Unique Identifier
Policy ID
Sequence ID
Log ID
Answer:
AExplanation:
In FortiOS 7.6, when FortiGate is integrated with FortiAnalyzer and FortiManager, firewall policies rely on a Universally Unique Identifier (UUID) to ensure proper policy tracking, synchronization, and log correlation across devices.
Why the UUID is required
Every firewall policy in FortiOS has a UUID.
FortiManager uses the UUID to:
Track policies across managed FortiGate devices
Maintain policy consistency during installs and revisions
FortiAnalyzer uses the UUID to:
Correlate logs accurately to the correct firewall policy
Preserve log association even if policy order or policy ID changes
Without a UUID:
Policy-to-log mapping can break
FortiManager cannot reliably manage or synchronize policies
FortiAnalyzer log analysis becomes inconsistent
This is explicitly documented in Fortinet administration and logging architecture references.
Why the other options are incorrect
B. Policy IDPolicy ID can change when policies are moved and is not reliable for long-term correlation across FortiManager and FortiAnalyzer.
C. Sequence IDSequence ID reflects GUI ordering only and has no role in log correlation.
D. Log IDLog ID is generated per log event, not per firewall policy.
What are three key routing principles in SD-WAN? (Choose three answers)
Options:
By default, SD-WAN rules are skipped if the included SD-WAN members do not have a valid route to the destination.
SD-WAN rules have precedence over any other type of routes.
Regular policy routes have precedence over SD-WAN rules.
By default, SD-WAN rules are skipped if only one route to the destination is available.
By default, SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member.
Answer:
A, C, EExplanation:
“This slide shows the SD-WAN rule lookup process. SD-WAN rules are essentially policy routes.”
“FortiGate performs a forwarding information base (FIB) lookup for the packet destination IP (dstip). If the resolved interface for the fib-best-match isn’t an SD-WAN member, then FortiGate moves on to the next rule. This behavior follows the key routing principle: SD-WAN rules are skipped if the best route to the destination isn’t an SD-WAN member .”
“If the resolved interface is an SD-WAN member, then FortiGate looks for one or more acceptable members in the oif list... An acceptable member is an alive member that has a route to the destination. This behavior follows the key routing principle: SD-WAN rules are skipped if none of the configured members in the rule have a valid route to the destination .”
“Because regular policy routes have precedence over any other routes...”
“Also note that policy routes have precedence over SD-WAN rules, and over any routes in the FIB.”
Technical Deep Dive:
The correct answers are A, C, and E .
A is correct because an SD-WAN rule is not enough by itself. A selected member must also be alive and have a valid route to the destination. If none of the members referenced by the rule can actually reach the destination, the rule is skipped.
C is correct because a regular policy route is evaluated before SD-WAN rules. This is a classic exam trap. FortiGate treats SD-WAN steering like policy-route logic, but standard policy routes still win if they match and are valid.
E is correct because FortiGate first checks the FIB best match . If that best route resolves to an interface that is not an SD-WAN member, FortiGate skips the SD-WAN rule and continues.
Why the others are wrong:
B is false because SD-WAN rules do not have precedence over everything; regular policy routes do.
D is false because the number of available routes is not the deciding rule. Even with only one route, SD-WAN can still steer traffic if the routing and member conditions are met.
Operationally, think of SD-WAN routing in this order: policy route check → SD-WAN rule lookup → standard FIB fallback . On FortiGate, the practical validation commands are:
get router info routing-table all
diagnose sys sdwan service
diagnose firewall proute list
That combination lets you confirm whether a packet is being captured by a policy route, whether an SD-WAN rule has acceptable members, and what the FIB currently resolves for the destination.
Refer to the exhibits.

An administrator configured both members of an HA cluster at the same time. After one week of monitoring, the administrator wants to verify the HA failover performance. How can the administrator force a failover? (Choose one answer)
Options:
The administrator must reset the HA uptime on HQ-NGFW-1.
The administrator must set the parameter override to enable on HQ-NGFW-2.
The administrator must increase the HA priority on HQ-NGFW-2.
The administrator must set the monitored port1 to down on HQ-NGFW-1.
Answer:
AExplanation:
“This slide shows the order when the HA override setting is disabled, which is the default behavior.”
“1. The cluster compares the number of monitored interfaces that have a status of up. The member with the most available monitored interfaces becomes the primary.
2. The cluster compares the HA uptime of each member. The member with the highest HA uptime, by at least five minutes, becomes the primary.
3. The member with the highest priority becomes the primary.”
“When HA override is disabled, the HA uptime has precedence over the priority setting. This means that if you must manually fail over to a secondary device, you can do so by reducing the HA uptime of the primary FortiGate. You can do this by running the diagnose sys ha reset-uptime command on the primary FortiGate, which resets its HA uptime to 0.”
Technical Deep Dive:
The correct answer is A .
Both HA members are configured with set override disable , so FGCP does not prefer the higher-priority unit first. With override disabled, the election order is based on monitored interfaces , then HA uptime , then priority , and finally serial number . Since the cluster has been running for one week , the secondary unit will have a much higher HA uptime than a unit whose uptime is reset to zero. Therefore, if the administrator runs diagnose sys ha reset-uptime on the current primary HQ-NGFW-1 , FGCP re-evaluates election and the other member can take over.
Option B is wrong because enabling override only on HQ-NGFW-2 does not by itself force an immediate clean failover in this scenario and also changes election behavior rather than performing the documented manual failover action. Option C is wrong because with override disabled, priority does not beat HA uptime . Option D can simulate a link failover , but the study guide’s documented manual failover method for this exact override-disabled condition is to reset the primary’s HA uptime.
Relevant CLI:
diagnose sys ha reset-uptime
get system ha status
diagnose sys ha status
This is the clean exam-aligned method to trigger a controlled HA role change.
FortiGate is operating in NAT mode and has two physical interfaces connected to the LAN and DMZ networks respectively. Which two statements about the requirements of connected physical interfaces on FortiGate are true? (Choose two.)
Options:
Both interfaces must have DHCP enabled and interfaces set to LAN and DMZ roles assigned.
Both interfaces must have the interface role assigned.
Both interfaces must have directly connected routes on the routing table.
Both interfaces must have IP addresses assigned.
Answer:
C, DExplanation:
In FortiOS 7.6, when a FortiGate is operating in NAT mode, physical interfaces that participate in traffic forwarding (such as LAN and DMZ) must meet certain fundamental requirements.
Correct statements
D. Both interfaces must have IP addresses assigned.
Correct
In NAT mode, FortiGate operates as a Layer-3 device.
Every interface that forwards traffic must have an IP address.
Without an IP address:
The interface cannot participate in routing
Firewall policies cannot be applied correctly
This is a mandatory requirement.
C. Both interfaces must have directly connected routes on the routing table.
Correct
When an IP address is assigned to an interface, FortiGate automatically installs a connected route for that subnet in the routing table.
These connected routes are required so FortiGate:
Knows how to reach the locally attached networks
Can forward traffic between LAN and DMZ
While administrators do not manually create these routes, their presence is required for correct operation.
Why the other options are incorrect
A. Both interfaces must have DHCP enabled and roles assigned.
Incorrect
DHCP is optional; interfaces can use static IPs.
Interface roles (LAN, DMZ, WAN) are administrative/GUI aids, not functional requirements.
B. Both interfaces must have the interface role assigned.
Incorrect
Interface roles affect GUI grouping and some default behavior.
They are not required for NAT mode operation or traffic forwarding.
An administrator wants to form an HA cluster using the FGCP protocol. Which two requirements must the administrator ensure both members fulfill? (Choose two answers)
Options:
They must have the same HA group ID.
They must have the heartbeat interfaces in the same subnet.
They must have the same number of configured VDOMs.
They must have the same hard drive configuration.
Answer:
A, DExplanation:
“To successfully form an HA cluster, you must ensure that the members have the same:
• Model: hardware model or VM model
• Firmware version
• Licensing: includes the FortiGuard license, virtual domain (VDOM) license, FortiClient license, and so on
• Hard drive configuration: the same number and size of drives and partitions
• Operating mode: the operating mode—NAT mode or transparent mode—of the management VDOM.”
“From a configuration and setup point of view, you must ensure that the HA settings on each member have the same group ID , group name, password, and heartbeat interface settings. Try to place all heartbeat interfaces in the same broadcast domain , or for two-member clusters, connect them directly.”
Technical Deep Dive:
The correct answers are A and D .
A is correct because FGCP cluster formation requires matching HA parameters, and group ID is explicitly one of them. If the group ID differs, the units will not consider each other part of the same cluster during HA discovery and election.
D is correct because FortiGate HA expects hardware parity in critical platform characteristics, including hard drive configuration . If disk layout differs, the members do not satisfy the HA formation prerequisites.
B is incorrect because the study guide does not require heartbeat interfaces to be in the same IP subnet. The requirement is that heartbeat links be in the same broadcast domain , or directly connected in a two-node design. In practice, heartbeat links are Layer 2 adjacency links; IP subnet matching is not the stated requirement.
C is incorrect because the guide does not say both units must start with the same number of configured VDOMs. What must match is the licensing level and the operating mode of the management VDOM . After cluster formation, the primary synchronizes its configuration to the secondary.
A practical verification set before forming FGCP HA is:
get system status
show system ha
diagnose sys ha status
Operationally, FGCP then uses the heartbeat links for member discovery, health monitoring, election, and config/session synchronization. On supported hardware, session forwarding and HA processing can still benefit from FortiGate’s ASIC-assisted architecture, but HA state, config sync, and election logic remain control-plane functions handled by FortiOS.
An administrator wanted to configure an IPS sensor to block traffic that triggers the signature set number of times during a specific time period. How can the administrator achieve the objective?
Options:
Use IPS group signatures, set rate-mode 60.
Use IPS packet logging option with periodical filter option.
Use IPS signatures, rate-mode periodical option.
Use IPS filter, rate-mode periodical option.
Answer:
CExplanation:
“ Rate-based IPS signatures also allows you to detect anomalies, which are unusual behaviors in the network...”
“There are two ways to add predefined signatures to an IPS sensor. One way is to select the signatures individually... The second way to add a signature to a sensor is using filters.”
“ You can also add rate-based signatures to block specific traffic when the threshold is exceeded. On the CLI, If you set the command rate-mode to periodical, FortiGate triggers the action when the threshold is reached during the configured Duration time period. ”
Technical Deep Dive:
The correct answer is C. Use IPS signatures, rate-mode periodical option.
The guide is explicit that this behavior belongs to rate-based IPS signatures . The question asks for blocking traffic when a signature is triggered a certain number of times within a defined interval. That is exactly what rate-mode periodical does: it evaluates the trigger count over the configured duration window and then applies the configured IPS action when the threshold is met.
Why the other options are wrong:
A is wrong because rate-mode 60 is not the documented syntax or method.
B is wrong because packet logging records packets; it does not implement threshold-based blocking logic.
D is wrong because the guide ties rate-mode periodical to rate-based signatures , not to IPS filters as the mechanism for this threshold behavior.
Operationally, this is used for anomaly-style detection, similar in concept to lightweight rate-based protection. A typical CLI pattern is along these lines:
config ips sensor
edit " custom-ips "
config entries
edit 1
set rule < signature_id >
set rate-mode periodical
set rate-count < threshold >
set rate-duration < seconds >
set action block
next
end
next
end
This works best when applied only to relevant protocols and signatures, because broad use of rate-based signatures can consume more resources and increase false-positive risk.
You have configured an application control profile, set peer-to-peer traffic to Block under the Categories tab. and applied it to the firewall policy. However, your peer-to-peer traffic on known ports is passing through the FortiGate without being blocked.
What FortiGate settings should you check to resolve this issue?
Options:
FortiGuard category ratings
Network Protocol Enforcement
Replacement Messages for UDP-based Applications
Application and Filter Overrides
Answer:
BExplanation:
When the Application sensor receives traffic on that port, the protocol decoder will try to determine if the received data matches the HTTPS traffic In this case it will not match because it is P2P traffic, so this will class as violation and blocked The protocol decoder also try to determine what type of traffic it is, and even if it could not figure out it is P2P traffic, it still count as a violation because even though it does not know what it is, it knows for fact it is not HTTPS
Refer to the exhibit.

FortiGate has two separate firewall policies for Sales and Engineering to access the same web server with the same security profiles.
Which action must the administrator perform to consolidate the two policies into one?
Options:
Select port1 and port2 subnets in a single firewall policy.
Create an Aggregate interface that includes port1 and port2 to create a single firewall policy.
Replace port1 and port2 with the any interface in a single firewall policy.
Enable Multiple Interface Policies to select port1 and port2 in the same firewall policy.
Answer:
DExplanation:
“By default, you can select only a single interface as the incoming interface and a single interface as the outgoing interface. This is because the option to select multiple interfaces, or any interface in a firewall policy, is disabled on the GUI. However, you can enable the Multiple Interface Policies option on the Feature Visibility page to disable the single interface restriction.”
“You can also specify multiple interfaces, or use the any option, if you configure a firewall policy on the CLI, regardless of the default GUI setting.”
Technical Deep Dive:
The correct answer is D .
The policies are identical except for the incoming interface : one is for Sales and one is for Engineering . FortiGate GUI policy creation normally restricts you to one incoming interface per policy. To consolidate both into a single GUI policy, the administrator must enable Multiple Interface Policies so both port1 and port2 can be selected in the same rule.
Why the others are wrong:
A is not enough, because policy matching also includes the incoming interface , not just the source subnets.
B changes the network design and is unnecessary.
C would work too broadly by matching traffic from any interface, which is not the intended controlled consolidation.
A matching CLI-style concept would be:
config firewall policy
edit < id >
set srcintf " port1 " " port2 "
set dstintf " < server-interface > "
set srcaddr " Sales_Subnet " " Engineering_Subnet "
set dstaddr " < web-server > "
set service " HTTP " " HTTPS "
set action accept
next
end
That preserves a single policy while still being specific about which interfaces are allowed.
Unlock NSE4_FGT_AD-7.6 Features
- NSE4_FGT_AD-7.6 All Real Exam Questions
- NSE4_FGT_AD-7.6 Exam easy to use and print PDF format
- Download Free NSE4_FGT_AD-7.6 Demo (Try before Buy)
- Free Frequent Updates
- 100% Passing Guarantee by Activedumpsnet
Questions & Answers PDF Demo
- NSE4_FGT_AD-7.6 All Real Exam Questions
- NSE4_FGT_AD-7.6 Exam easy to use and print PDF format
- Download Free NSE4_FGT_AD-7.6 Demo (Try before Buy)
- Free Frequent Updates
- 100% Passing Guarantee by Activedumpsnet