FCP_FGT_AD-7.6

Practice FCP_FGT_AD-7.6 Exam

Is it difficult for you to decide to purchase Fortinet FCP_FGT_AD-7.6 exam dumps questions? CertQueen provides FREE online FCP - FortiGate 7.6 Administrator FCP_FGT_AD-7.6 exam questions below, and you can test your FCP_FGT_AD-7.6 skills first, and then decide whether to buy the full version or not. We promise you get the following advantages after purchasing our FCP_FGT_AD-7.6 exam dumps questions.
1.Free update in ONE year from the date of your purchase.
2.Full payment fee refund if you fail FCP_FGT_AD-7.6 exam with the dumps

 

 Full FCP_FGT_AD-7.6 Exam Dump Here

Latest FCP_FGT_AD-7.6 Exam Dumps Questions

The dumps for FCP_FGT_AD-7.6 exam was last updated on Aug 20,2025 .

Viewing page 1 out of 11 pages.

Viewing questions 1 out of 58 questions

Question#1

Which two statements describe how the RPF check is used? (Choose two.)

A. The RPF check is run on the first sent packet of any new session.
B. The RPF check is run on the first reply packet of any new session.
C. The RPF check is run on the first sent and reply packet of any new session.
D. The RPF check is a mechanism that protects FortiGate and the network from IP spoofing attacks.

Explanation:
The Reverse Path Forwarding (RPF) check is run on the first sent packet of any new session to ensure that the packet arrives on a legitimate interface. This check protects the network from IP spoofing attacks by verifying that a return route exists from the receiving interface back to the source IP address. If the route is invalid or not found, the packet is discarded. Options B and C are incorrect because RPF checks are performed on the first sent packet, not the reply packet.
Reference: FortiOS 7.4.1 Administration Guide: Reverse Path Forwarding (RPF) Check

Question#2

Refer to the exhibit.



Examine the intrusion prevention system (IPS) diagnostic command.
Which statement is correct If option 5 was used with the IPS diagnostic command and the outcome was a decrease in the CPU usage?

A. The IPS engine was inspecting high volume of traffic.
B. The IPS engine was unable to prevent an intrusion attack.
C. The IPS engine was blocking all traffic.
D. The IPS engine will continue to run in a normal state.

Explanation:
If there are high-CPU use problems caused by the IPS, you can use the diagnose test application ipsmonitor command with option 5 to isolate where the problem might be. Option 5 enables IPS bypass mode.
In this mode, the IPS engine is still running, but it is not inspecting traffic.
If the CPU use decreases after that, it usually indicates that the volume of traffic being inspected is too high for that FortiGate model.
If the CPU use remains high after enabling IPS bypass mode, it usually indicates a problem in the IPS engine, which you must report to Fortinet Support.
If there are high-CPU use problems caused by the IPS, you can use the diagnose test application ipsmonitor command with option 5 to isolate where the problem might be. Option 5 enables IPS bypass mode. In this mode, the IPS engine is still running, but it is not inspecting traffic. If the CPU use decreases after that, it usually indicates that the volume of traffic being inspected is too high for that FortiGate model.

Question#3

You have configured an application control profile, set peer-to-peer traffic to Block under the Categories tab, and applied it to the firewall policy. However, your peer-to-peer traffic on known ports is passing through the FortiGate without being blocked.
What FortiGate settings should you check to resolve this issue?

A. FortiGuard category ratings
B. Application and Filter Overrides
C. Network Protocol Enforcement
D. Replacement Messages for UDP-based Applications

Explanation:
Network Protocol Enforcement settings control how FortiGate inspects and enforces protocols on traffic, including peer-to-peer applications on known ports. If not properly enabled, peer-to-peer traffic may bypass blocking despite the application control profile.

Question#4

Which three methods can you use to deliver the token code to a user who is configured to use two-factor authentication? (Choose three.)

A. Instant message app
B. FortiToken
C. Email
D. Voicemail message
E. SMS text message

Explanation:
The three methods that can be used to deliver the token code to a user configured to use two-factor authentication are:
B. FortiToken
FortiToken is a physical or software-based token that generates time-based or event-based codes for two-factor authentication.
C. Email
The token code can be delivered to the user via email, where the user has access to the code through their email account.
E. SMS text message
The token code can be sent to the user as a text message (SMS) to their mobile device.
These methods provide flexibility in delivering the token code to users for two-factor authentication.
So, the correct choices are B, C, and E.

Question#5

An administrator is configuring an Ipsec between site A and site B. The Remotes Gateway setting in both sites has been configured as Static IP Address. For site A, the local quick mode selector is 192.16.1.0/24 and the remote quick mode selector is 192.16.2.0/24.
How must the administrator configure the local quick mode selector for site B?

A. 192.16.3.0/24
B. 192.16.2.0/24
C. 192.16.1.0/24
D. 192.16.0.0/8

Explanation:
The local quick mode selector for site B should be configured to match the remote quick mode selector of site
A. In this case, the remote quick mode selector for site A is 192.16.2.0/24. Therefore, the correct answer is: B. 192.16.2.0/24
So, the administrator should configure the local quick mode selector for site B as 192.16.2.0/24 to ensure that the IPsec VPN configuration is consistent between the two sites.

Exam Code: FCP_FGT_AD-7.6         Q & A: 292 Q&As         Updated:  Aug 20,2025

 

 Full FCP_FGT_AD-7.6 Exam Dumps Here