NSE4_FGT_AD-7.6 Online Practice Questions

Home / Fortinet / NSE4_FGT_AD-7.6

Latest NSE4_FGT_AD-7.6 Exam Practice Questions

The practice questions for NSE4_FGT_AD-7.6 exam was last updated on 2025-11-10 .

Viewing page 1 out of 21 pages.

Viewing questions 1 out of 105 questions.

Question#1

Refer to the exhibit.



A network administrator is troubleshooting an IPsec tunnel between two FortiGate devices. The administrator has determined that phase 1 failed to come up. The administrator has also re-entered the pre-shared key on both FortiGate devices to make sure they match.
Based on the phase 1 configuration and the diagram shown in the exhibit, which two configuration changes can the administrator make to bring phase 1 up? (Choose two.)

A. On HQ-FortiGate, disable Diffie-Helman group 2.
B. On Remote-FortiGate, set port2 as Interface.
C. On both FortiGate devices, set Dead Peer Detection to On Demand.
D. On HQ-FortiGate, set IKE mode to Main (ID protection).

Explanation:
Based on the phase 1 configuration and the diagram shown in the exhibit, the administrator can make the following two configuration changes to bring phase 1 up:
B. On Remote-FortiGate, set port2 as Interface: The diagram indicates that port2 is currently not selected under ‘Interface’ for Remote-FortiGate. Aligning this setting with HQ-FortiGate, which has port1 set as Interface, might resolve inconsistencies.
D. On HQ-FortiGate, set IKE mode to Main (ID protection): The current setting on HQ-FortiGate is Aggressive for IKE mode, while Remote-FortiGate is set to Main mode. Matching these settings may help in establishing phase 1 of the IPsec tunnel.

Question#2

Which two statements are correct about NGFW Policy-based mode? (Choose two.)

A. NGFW policy-based mode does not require the use of central source NAT policy
B. NGFW policy-based mode can only be applied globally and not on individual VDOMs
C. NGFW policy-based mode supports creating applications and web filtering categories directly in a firewall policy
D. NGFW policy-based mode policies support only flow inspection

Explanation:
C. NGFW policy-based mode supports creating applications and web filtering categories directly in a firewall policy.
In NGFW policy-based mode, you can define applications and web filtering categories directly within the firewall policy. This allows you to apply specific controls and restrictions based on the types of applications and content, offering a more granular approach to managing network traffic.
D. NGFW policy-based mode policies support only flow inspection.
In NGFW (Next-Generation Firewall) policy-based mode, the emphasis is on flow inspection. Flow inspection involves evaluating the traffic based on predefined rules and policies without deep packet inspection of the content. This mode is optimized for efficiently processing large volumes of traffic by analyzing the flow of data and making decisions based on factors such as source, destination, ports, and protocol.

Question#3

An organization's employee needs to connect to the office through a high-latency internet connection.
Which SSL VPN setting should the administrator adjust to prevent the SSL VPN negotiation failure?

A. Change the session-ttl.
B. Change the login-timeout.
C. Change the idle-timeout.
D. Change the udp-idle-timer.

Explanation:
Change the login-timeout.
Set up timers to avoid logouts when SSL VPN users are connected over high latency connections. When connected to SSL VPN over high latency connections, FortiGate can time out the client before the client can finish the negotiation process, such as DNS lookup and time to enter a token. Two new CLI commands under "config vpn ssl settings" have been added to address this. The first command "set login-timeout" allows you to set up the login timeout, replacing the previous hard timeout value. The second command "set dtls-hello-timeout" allows you to set up the maximum DTLS hello timeout for SSL
VPN connections.

Question#4

Which statement correctly describes NetAPI polling mode for the FSSO collector agent?

A. NetAPI polling can increase bandwidth usage in large networks.
B. The NetSessionEnum function is used to track user logouts.
C. The collector agent must search security event logs.
D. The collector agent uses a Windows API to query DCs for user logins.

Explanation:
The NetSessionEnum function is used to track user logouts.
Study Guide C FSSO C FSSO with Windows Active Directory C Collector Agent-Based Polling Mode Options.
Collector agent-based polling mode has three methods (or options) for collecting logon info: NetAPI, WinSecLog and WMI.
NetAPI: Polls temporary sessions created on the DC when a user logs on or logs off and calls the NetSessionEnum function on Windows. It’s faster than the WinSec and WMI methods; however, it can miss some logon events if a DC is under heavy system load. This is because sessions can be quickly created and purged form RAM, before the agent has a chance to poll and notify FG.
NetAPI: polls temporary sessions created on the DC when a user logs in or logs out and calls the NetSessionEnum function on Windows. It’s faster than the WinSec and WMI methods; however, it can miss some login events if a DC is under heavy system load. This is because sessions can be quickly created and purged from RAM, before the agent has a chance to poll and notify FortiGate.
Incorrect:
A. NetAPI polling can increase bandwidth usage in large networks. (WinSecLog)
C. The collector agent must search security event logs. (WinSecLog)
D. The collector agent uses a Windows API to query DCs for user logins. (WMI)
- WinSecLog: polis all the security event logs from the DC. It doesn't miss any login events that have been recorded by the DC because events are not normally deleted from the logs. There can be some delay in FortiGate receiving events if the network is large and, therefore, writing to the logs is slow. It also requires that the audit success of specific event IDs is recorded in the Windows security logs. For a full list of supported event IDs, visit the Fortinet Knowledge Base (http://kb.fortinet.com).
- NetAPI: polls temporary sessions created on the DC when a user logs in or logs out and calls the NetSessionEnum function on Windows. It's faster than the WinSec and WMI methods; however, it can miss some login events if a DC is under heavy system load. This is because sessions can be quickly created and purged from RAM, before the agent has a chance to poll and notify FortiGate.

Question#5

Refer to the exhibits.



Based on the current HA status, an administrator updates the override and priority parameters on HQ-NGFW-1 and HQ-NGFW-2 as shown in the exhibit.
What would be the expected outcome in the HA cluster?

A. HQ-NGFW-1 will synchronize the override disable setting with HQ-NGFW-2.
B. HQ-NGFW-2 will take over as the primary because it has the override enable setting and higher priority than HQ-NGFW- 1.
C. HQ-NGFW-1 will remain the primary because HQ-NGFW-2 has lower priority.
D. The HA cluster will become out of sync because the override setting must match on all HA members.

Explanation:
With override enabled on HQ-NGFW-2 and its higher priority (110 vs. 90), HQ-NGFW-2 will become the primary device, preempting HQ-NGFW-1 despite the current primary status.

Exam Code: NSE4_FGT_AD-7.6Q & A: 296 Q&AsUpdated:  2025-11-10

 Get All NSE4_FGT_AD-7.6 Q&As