Last Updated On : 13-Jan-2026


Fortinet FCP - FortiGate 7.4 Administrator - FCP_FGT_AD-7.4 Practice Questions

Total 89 Questions


An administrator must enable a DHCP server on one of the directly connected networks on FortiGate. However, the administrator is unable to complete the process on the GUI to enable the service on the interface. In this scenario, what prevents the administrator from enabling DHCP service?



A. The role of the interface prevents setting a DHCP server.


B. The DHCP server setting is available only on the CLI.


C. Another interface is configured as the only DHCP server on FortiGate.


D. The FortiGate model does not support the DHCP server.





A.
  The role of the interface prevents setting a DHCP server.

Explanation:

On a FortiGate, the ability to enable a DHCP server on an interface is directly tied to the interface's Role. If an interface is configured with the role WAN (in many default configurations or SD-WAN zones), the GUI will not provide the option to enable a DHCP server on that interface. This is a design restriction because WAN interfaces typically receive dynamic addresses from an ISP and are not intended to act as DHCP servers for internal networks. To enable a DHCP server, the interface must have its role set to LAN or another non-WAN role (or have no specific role assigned).

Why the other options are incorrect:

B. The DHCP server setting is available only on the CLI:
This is false. The DHCP server is fully configurable via both the GUI and the CLI. The issue described is a GUI-specific restriction based on interface role.

C. Another interface is configured as the only DHCP server on FortiGate:
This is false. A FortiGate can have a DHCP server enabled on multiple interfaces simultaneously. There is no restriction that limits the device to only one DHCP server instance.

D. The FortiGate model does not support the DHCP server:
This is false. The DHCP server is a fundamental, universally supported feature across all FortiGate models and firmware versions.

Reference:
This behavior is documented in the FortiGate administration guide under Network -> Interfaces and Network -> DHCP Server. The GUI dynamically shows or hides configuration options based on the interface's assigned role.

The HTTP inspection process in web filtering follows a specific order when multiple features are enabled in the web filter profile. Which order must FortiGate use when the web filter profile has features such as safe search enabled?



A. FortiGuard category filter and rating filter


B. Static domain filter, SSL inspection filter, and external connectors filters


C. DNS-based web filter and proxy-based web filter


D. Static URL filter, FortiGuard category filter, and advanced filters





D.
  Static URL filter, FortiGuard category filter, and advanced filters

Explanation:

FortiGate follows a specific, hierarchical order when inspecting HTTP traffic with multiple web filtering features enabled. When a request is made, the firewall evaluates it against the configured filters in this fixed sequence. Features like Safe Search are considered "advanced filters" (also referred to as content filters or feature filters in some documentation). The correct, general order is:

Static URL Filter: Exact URL matches in block/allow lists are checked first.
FortiGuard Category/Rating Filter: The URL is categorized by FortiGuard.
Advanced Filters: Finally, features like Safe Search, YouTube Education filter, script blocking, etc., are applied.

This order ensures that explicit allows/blocks take precedence, followed by categorization, and finally specific content manipulations or checks.

Why the other options are incorrect:

A. FortiGuard category filter and rating filter:
This is incomplete. While these are key components, they come after static URL filtering in the order of operations.

B. Static domain filter, SSL inspection filter, and external connectors filters:
This sequence is incorrect. SSL inspection is a prerequisite for deep inspection of HTTPS traffic but is not part of the sequential logic of the web filter scan. External connectors (like ICAP) are typically applied at a different stage. The core, internal web filter evaluation order is different.

C. DNS-based web filter and proxy-based web filter:
These are different modes or methods of web filtering (DNS Filter vs. Flow/Proxy-based Web Filter), not the sequential order of feature evaluation within a single profile.

Reference:

FortiOS Administration Guide, specifically the Web Filter chapter, details the "order of scanning" for web filter profiles. The documentation states that Web Filter processing follows the sequence: Static URL Filter -> FortiGuard Web Filtering (Category/Rating) -> Web Content Filter (which includes features like Safe Search, YouTube restrictions, etc.).

A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes. All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover. Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)



A. Enable Dead Peer Detection


B. Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.


C. Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.


D. Configure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.





A.
  Enable Dead Peer Detection

C.
  Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.

Explanation:
The requirement has two main objectives:
Path Selection: Ensure the primary tunnel is used when both are up.

Fast Failover: Detect a dead tunnel quickly to fail over to the secondary.
To achieve this, two specific configuration changes are needed:

C. Configure route distances:
In FortiOS (and standard IP routing), the route with the lowest administrative distance is preferred. Therefore, to make the primary tunnel the preferred path, its associated static route must have a lower distance value than the route for the secondary tunnel. This ensures the primary route is installed in the routing table when the tunnel is active, meeting the "all traffic must be routed through the primary" requirement.

A. Enable Dead Peer Detection (DPD):
DPD is a mechanism that allows an IPsec peer to determine if another peer is still alive ("reachable"). When enabled, the FortiGate can detect a failed tunnel more quickly than waiting for a Phase 1 or Phase 2 timeout. This "speeds up tunnel failover" as explicitly required. DPD is configured within the IPsec VPN Phase 1 settings.

Reference:

Route Distance:
FortiOS Administration Guide -> Routing chapter explains that the route with the lowest distance is preferred.
Dead Peer Detection:
FortiOS Administration Guide -> IPsec VPN chapter details DPD settings for faster failure detection.

Why the other options are incorrect:

B. Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration:
This is incorrect and partially misleading.
Auto-negotiate is typically a Phase 1 setting that allows automatic renegotiation of Security Associations (SAs), but it is not the primary mechanism for fast failure detection.
Autokey Keep Alive is not a standard FortiGate IPsec term for tunnel health checking. The correct feature for fast tunnel failure detection is Dead Peer Detection (DPD), which is configured in Phase 1.

D. Configure a higher distance on the static route for the primary tunnel...:
This is the opposite of what is required. A higher administrative distance makes a route less preferred. Configuring this would cause the secondary tunnel to be used even when the primary is up, violating the core requirement.

Which two features of IPsec IKEv1 authentication are supported by FortiGate? (Choose two.)



A. Pre-shared key and certificate signature as authentication methods


B. Extended authentication (XAuth)to request the remote peer to provide a username and password


C. Extended authentication (XAuth) for faster authentication because fewer packets are exchanged


D. No certificate is required on the remote peer when you set the certificate signature as the authentication method





A.
  Pre-shared key and certificate signature as authentication methods

B.
  Extended authentication (XAuth)to request the remote peer to provide a username and password

Explanation:

A. Pre-shared key and certificate signature as authentication methods:
FortiGate fully supports the two standard IKEv1 Phase 1 authentication methods defined in the RFCs: Pre-Shared Keys (PSK) and Digital Certificates (signatures). These are configured in the Phase 1 proposal settings.

B. Extended authentication (XAuth) to request the remote peer to provide a username and password:
Extended Authentication (XAuth) is an IKEv1 extension supported by FortiGate. It adds a second authentication step where the VPN gateway can request a username and password from the remote client after the Phase 1 (machine/device) authentication is complete. This is commonly used in remote-access VPN scenarios.

Why the other options are incorrect:

C. Extended authentication (XAuth) for faster authentication because fewer packets are exchanged:
This is false. XAuth does not make authentication faster nor does it use fewer packets. On the contrary, it adds an extra authentication exchange (more packets) after the initial IKE Phase 1 SA is established, which slightly increases the connection setup time.

D. No certificate is required on the remote peer when you set the certificate signature as the authentication method:
This is false. If the authentication method is set to Certificate, then both peers (the FortiGate and the remote peer) must have a valid certificate to authenticate each other. The statement is a logical contradiction. This scenario might describe a one-way authentication, but IKEv1 with certificates is mutual authentication by standard definition.
This response is AI-generated, for reference only.

Reference:
FortiOS Administration Guide, IPsec VPN chapter, specifically the sections on IKEv1 Phase 1 configuration and XAuth configuration.

An administrator wants to configure dead peer detection (DPD) on IPsec VPN for detecting dead tunnels. The requirement is that FortiGate sends DPD probes only when there is outbound traffic but no response from the peer.

Which DPD mode on FortiGate meets this requirement?



A. On Demand


B. On Idle


C. Disabled


D. Enabled





A.
  On Demand

Explanation:

The On Demand Dead Peer Detection (DPD) mode exactly matches the requirement: "FortiGate sends DPD probes only when there is outbound traffic but no response from the peer." In this mode, DPD is triggered when the FortiGate has data packets ready to send to the peer but has not received any incoming packets from that peer within a certain period (the ondemand timer). It then sends a DPD probe to check the peer's liveness. If there is no traffic, no probes are sent. This is efficient and conserves bandwidth.

Why the other options are incorrect:

B. On Idle:
This mode sends DPD probes at regular intervals when the tunnel is idle (no traffic). This does not match the requirement, as it would send probes even without outbound traffic.

C. Disabled:
This turns DPD off entirely, so no failure detection occurs, violating the requirement to detect dead tunnels.

D. Enabled:
This is ambiguous and not a precise mode in FortiOS. In the GUI, you typically select a specific mode: On Demand or On Idle. Selecting "Enabled" often defaults to On Idle behavior, which sends periodic probes. The explicit mode that matches the described behavior is On Demand.

Reference:
FortiOS Administration Guide, IPsec VPN chapter, specifically the section on Dead Peer Detection configuration. The guide describes "on-demand" as the mode where DPD messages are sent only when necessary to confirm a peer is still alive when traffic needs to be sent.

Which two statements are correct when FortiGate enters conserve mode? (Choose two.)



A. FortiGate halts complete system operation and requires a reboot to regain available resources


B. FortiGate refuses to accept configuration changes


C. FortiGate continues to run critical security actions, such as quarantine.


D. FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled





C.
  FortiGate continues to run critical security actions, such as quarantine.

D.
  FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled

Explanations:

A. FortiGate halts complete system operation and requires a reboot to regain available resources ❌ Incorrect.
FortiGate does not halt completely in conserve mode. It reduces functionality to preserve memory but continues forwarding traffic. A reboot is not required; conserve mode exits automatically once memory usage drops below the threshold.

B. FortiGate refuses to accept configuration changes ❌ Incorrect.
FortiGate still accepts configuration changes in conserve mode. However, certain non-critical processes (like UTM features) may be disabled depending on configuration. The system does not outright block admin changes.

C. FortiGate continues to run critical security actions, such as quarantine. ✅ Correct.
Even in conserve mode, FortiGate prioritizes critical security functions (e.g., antivirus quarantine, session handling). This ensures that essential protections remain active despite memory pressure.

D. FortiGate continues to transmit packets without IPS inspection when the fail-open global setting in IPS is enabled. ✅ Correct.
If IPS is configured with fail-open, FortiGate will bypass IPS inspection during conserve mode to keep traffic flowing. This is a deliberate design to maintain availability when resources are constrained.

📖 Reference:
Fortinet Documentation: FortiOS Administration Guide – Conserve Mode
Fortinet KB Article: “Conserve mode behavior and IPS fail-open setting”

Which engine handles application control traffic on the next-generation firewall (NGFW) FortiGate?



A. Internet Service Database (ISDB) engine


B. Intrusion prevention system engine


C. Antivirus engine


D. Application control engine





D.
  Application control engine

Explanation:

The Application Control Engine is the specialized, dedicated engine within FortiGate's NGFW that handles application identification, classification, and control. It uses a database of application signatures (the Application Control signature database) to detect thousands of applications regardless of port, protocol, or evasive tactics like SSL encryption. Once identified, the engine can apply policy actions (allow, block, monitor, etc.) based on the configured application control profile. While application control is part of the unified security fabric, its processing is handled by this specific engine.

Why the other options are incorrect:

A. Internet Service Database (ISDB) engine:
The ISDB is a separate database and engine used to identify and categorize known public internet services (like Microsoft 365, AWS, Google services) by their IP ranges. It is used for routing, policy, and SD-WAN rules, but not for deep application identification and control within traffic flows.

B. Intrusion prevention system engine:
The IPS engine is dedicated to detecting and preventing network attacks and vulnerabilities based on attack signatures and anomalies. While both IPS and App Control perform deep packet inspection, they use different signature databases and have different purposes (security threats vs. application identification).

C. Antivirus engine:
The antivirus engine scans files and content for malware signatures and heuristics. Its purpose is to detect malicious software, not to identify and control application protocols and services.

Reference:
FortiOS Administration Guide, specifically the Application Control chapter. The architecture section explains that application control is performed by a dedicated engine that analyzes traffic patterns, protocol behaviors, and signatures to identify applications.

Page 4 out of 13 Pages
FCP_FGT_AD-7.4 Practice Test Home Previous

Why Prepare with PrepForti FCP_FGT_AD-7.4 Practice Test?

Choosing the right preparation material is critical for passing the Fortinet FCP - FortiGate 7.4 Administrator exam. Here’s how our FCP_FGT_AD-7.4 practice test is designed to bridge the gap between knowledge and a passing score.

Experience the Real Exam Format:


Familiarize yourself with the exact style, difficulty, and question types you will encounter on the official Fortinet exam. Our FCP - FortiGate 7.4 AdministratorFCP_FGT_AD-7.4 test questions, like the samples on this page, cover specific technical scenarios and MCQs to ensure there are no surprises on test day.

Turn Knowledge into Application:


The smartest way to prepare isn't just reading - it's practicing. Our FCP - FortiGate 7.4 Administrator practice test questions transforms your theoretical understanding into practical problem-solving skills, exactly what is required to pass.

Learn with Detailed Explanations:


All FCP_FGT_AD-7.4 exam questions comes with a comprehensive summary and a breakdown of why the correct option is right and the others are wrong. This detailed feedback helps you identify your strengths and target your weaknesses, making your FCP - FortiGate 7.4 Administrator study time far more efficient.



Experience the Real Exam Now!

Fortinet FCP - FortiGate 7.4 Administrator Practice Exam Questions