Last Updated On : 7-Apr-2026


FCSS - Network Security 7.6 Support Engineer - FCSS_NST_SE-7.6 Practice Questions

Total 95 Questions


Refer to the exhibit, which shows a partial output from the get router info routing-table database command.

The administrator wants to configure a default static route for port3 and assign a distance of 50 and a priority of 0.
What will happen to the port1 and port2 default static routes after the port3 default static route is created?



A. The port2 default static route will be injected into the forwarding information base (FIB).


B. The port1 default static route will be injected into the FIB.


C. Neither of the routes shown in the output will be injected into the FIB.


D. Both default static routes shown in the output will be injected into the FIB.





A.
  The port2 default static route will be injected into the forwarding information base (FIB).

Explanation:

The output shows two existing default static routes (0.0.0.0/0):
Via port2, distance 20, administrative distance 10, no priority set [10/0].
Via port1, distance 10, administrative distance 50, marked inactive, priority 0 [50/0].
The active route in the FIB is chosen based on:
Lowest distance (primary metric).
If distances are equal, then lowest administrative distance.
If both are equal, then highest priority (ECMP).

Currently, the port2 route has distance 20, which is higher (worse) than the port1 route's distance 10. However, the port1 route is inactive, meaning it is not eligible for the FIB, so port2 is installed as the active default route.
Adding a new default route via port3 with distance 50 and priority 0 will have a higher (worse) distance than both existing routes. Therefore, it will not become the active route. Since the port1 route remains inactive, the port2 route (distance 20) will remain the best valid route and will stay injected into the FIB.

Why the Other Options are Incorrect:

B. The port1 route is inactive, so it cannot be injected into the FIB regardless of its distance or priority.

C. The port2 route is currently active and will remain active because the new route has a worse distance (50) and the port1 route is inactive.

D.Only one default route can be active in the FIB at a time for a given destination (ECMP is an exception with equal distances). The port1 route is inactive, so only port2 can be injected.

Reference:
FortiOS routing selection algorithm:
Distance → Administrative Distance → Priority. An inactive route is excluded from consideration. The command get router info routing-table database shows all routes in the RIB, while get router info routing-table all shows only active FIB routes.

Which authentication option can you not configure under config user radius on FortiOS?



A. mschap


B. pap


C. mschap2


D. eap





D.
  eap

Explanation:
When configuring RADIUS authentication on FortiOS using the CLI (config user radius), the supported authentication types are PAP, MSCHAP, and MSCHAPv2. These are explicitly selectable under the set auth-type command. FortiOS does not allow configuration of EAP (Extensible Authentication Protocol) in this context. EAP is primarily used in wireless authentication scenarios such as 802.1X with WPA2-Enterprise, and FortiGate devices rely on FortiAuthenticator or external RADIUS servers to handle EAP methods. Therefore, within FortiOS itself, EAP is not a valid option under config user radius.

A. mschap
→ Supported. MSCHAP is a challenge-response protocol used for RADIUS authentication. It is weaker than MSCHAPv2 but still available in FortiOS.

B. pap
→ Supported. PAP is the simplest form of RADIUS authentication, transmitting credentials in clear text. While insecure, it is often used for compatibility with legacy systems.

C. mschap2
→ Supported as MSCHAPv2. This is the stronger variant of MSCHAP, offering improved security and widely used in RADIUS environments.

D. eap
→ Not supported. FortiOS does not provide EAP configuration under config user radius. EAP methods must be handled by FortiAuthenticator or external RADIUS servers, not directly by FortiGate.

Thus, the correct answer is EAP, because FortiOS restricts RADIUS authentication types to PAP, MSCHAP, and MSCHAPv2 only. This distinction is important in exam scenarios because EAP is often confused as a possible option due to its common use in enterprise wireless authentication, but it is not configurable within FortiOS RADIUS settings.

📖References:
FortiOS CLI Reference Guide 7.6 – User RADIUS Configuration (set auth-type {pap | chap | mschap | mschapv2})

Which two statements are true regarding heartbeat messages sent from an FSSO collector agent to FortiGate? (Choose two.)



A. The heartbeat messages can be seen using the command diagnose debug authd fsso list.


B. The heartbeat messages can be seen in the collector agent logs.


C. The heartbeat messages can be seen on FortiGate using the real-lime FSSO debug.


D. The heartbeat messages must be manually enabled on FortiGate.





B.
  The heartbeat messages can be seen in the collector agent logs.

C.
  The heartbeat messages can be seen on FortiGate using the real-lime FSSO debug.

Explanation:

A. The diagnose debug authd fsso list command displays real-time communication events between the FortiGate and FSSO Collector Agents, including heartbeat messages (typically logged as periodic "poll" or "keepalive" events). This is the primary method to monitor agent connectivity.

C. The "real-time FSSO debug" refers to the same output generated by diagnose debug authd fsso list (usually enabled via diagnose debug enable). Heartbeat exchanges are visible here, showing the active status of each agent.

Why the Other Options are Incorrect:

B. Heartbeat messages are sent from the Collector Agent to the FortiGate.
While the agent logs may show its own activity, the heartbeat messages themselves (the network packets) are not logged in detail on the agent side. The agent logs focus on user authentication events and service status, not the low-level heartbeat packets.

D. Heartbeats are automatically enabled when FSSO is configured.
No manual activation is required. The heartbeat interval is configurable (default is 5 minutes), but the feature itself is always active once an agent is defined on the FortiGate.

Reference:
FSSO architecture documentation states that Collector Agents send periodic heartbeats to the FortiGate to confirm connectivity. These are monitored via FortiGate debug commands (diagnose debug authd fsso list) to troubleshoot agent communication issues.

Refer to the exhibits.

An administrator is attempting to advertise the network configured on port3. However, FGTA is not receiving the prefix.
Which two actions can the administrator take to fix this problem? (Choose two.)



A. Modify the prefix using the network command from 172.16.0.0/16 to 172.16.54.0/24.


B. Manually add the BGP route on FGT-A.


C. Restart BGP using a soft reset to force both peers to exchange their complete BGP routing tables.


D. Use the set network-import-check disable command.





A.
  Modify the prefix using the network command from 172.16.0.0/16 to 172.16.54.0/24.

D.
  Use the set network-import-check disable command.

Explanation:

The issue is that FortiGate B (FGT-B) has an interface port3 with IP 172.16.54.115/24, but its BGP configuration is advertising 172.16.0.0/16. By default, FortiOS has network-import-check enabled, which requires that a route must exist in the device's routing table (RIB) with an exact prefix length match before BGP will advertise it.

A. Changing the advertised network to 172.16.54.0/24 matches the exact subnet of the connected interface route (172.16.54.0/24) that exists in the RIB, satisfying the network-import-check requirement.

D. Disabling network-import-check allows BGP to advertise the 172.16.0.0/16 network even though the local routing table only contains a more specific /24 subnet for that network. This overrides the exact-match requirement.

Why the Other Options are Incorrect:

B. Manually adding the BGP route on FGT-A does not fix the root cause on FGT-B.
The problem is that FGT-B is not advertising the route due to the import-check failure. Adding a static route on the receiving side is a workaround, not a proper fix, and undermines dynamic routing.

C. A soft reset (execute router clear bgp ip soft) will not help because the route is not being advertised at all from FGT-B.
The BGP session is already established (Up/Down 1d3h33m), but FGT-A shows State/PfxRcd 0 (zero prefixes received). A reset only re-exchanges existing advertised routes; it cannot force advertisement of a route that fails the local export check.

Reference:
FortiOS BGP configuration:
The network command under config router bgp requires the prefix to be present in the RIB when network-import-check is enabled (default). This is a common troubleshooting scenario for missing BGP advertisements.

Refer to the exhibit, which shows the omitted output of a session table entry.

Which two statements are true? (Choose two.)



A. The traffic has been tagged for VLAN 0000.


B. NP7 is handling offloading of this session.


C. The traffic matches Policy ID 1.


D. The session has been offloaded.





C.
  The traffic matches Policy ID 1.

D.
  The session has been offloaded.

Explanation:

C. The line policy_id=1 explicitly shows that this session was created by and matches firewall policy ID 1. This is a direct mapping from the session table to the configured policy.

D. The line npu info: flag=0x81/0x81, offload=8/8, ips_offload=1/1 indicates the session is fully offloaded to the Network Processing Unit (NPU). The offload=8/8 (or similar symmetric values) means both forward and reverse traffic paths are hardware-accelerated. The ips_offload=1/1 confirms IPS processing is also offloaded.

Why the Other Options are Incorrect:

A. The vlan=0x0000/0x0000 indicates no VLAN tagging is applied to this session (0x0000 means untagged). It does not mean traffic is "tagged for VLAN 0000"; VLAN ID 0 is invalid for tagging.

B. The output does not specify which NP model (e.g., NP6, NP7, SoC) is handling offloading. While npu_state and npu info confirm offloading is occurring, the specific NPU generation cannot be determined from this snippet alone; it could be NP6, NP7, or another ASIC depending on the FortiGate model.

Reference:
FortiOS session table diagnostics (diagnose sys session list). The policy_id field shows the matching firewall policy. NPU offloading status is shown in npu info with flags and offload counters; symmetric values indicate full acceleration. VLAN tags are shown in hex, where 0x0000 means untagged.

Which statement about protocol options is true?



A. Protocol options allow administrators to configure a maximum number of sessions for each configured protocol.


B. Protocol options give administrators a streamlined method to instruct FortiGate to block all sessions corresponding to disabled protocols.


C. Protocol options allow administrators to configure the Any setting for all enabled protocols, which provides the most efficient use of system resources.


D. Protocol options allow administrators to configure which Layer 4 port numbers map to upper-layer protocols, such as HTTP, SMTP, FTP, and so on.





D.
  Protocol options allow administrators to configure which Layer 4 port numbers map to upper-layer protocols, such as HTTP, SMTP, FTP, and so on.

Explanation:

Protocol options in FortiOS are used to define how FortiGate handles traffic for specific application protocols. They allow administrators to configure inspection parameters and port mappings so that FortiGate can correctly identify and process traffic such as HTTP, SMTP, FTP, POP3, and IMAP. By mapping Layer 4 port numbers to these upper-layer protocols, FortiGate ensures that security profiles (e.g., antivirus, web filtering, DLP) are applied correctly to the intended traffic. This is the true function of protocol options, making D the correct answer.

A. Protocol options allow administrators to configure a maximum number of sessions for each configured protocol.
✘ Incorrect. Session limits are controlled by firewall policies or system-wide session settings, not protocol options. Protocol options focus on inspection behavior, not session counts.

B. Protocol options give administrators a streamlined method to instruct FortiGate to block all sessions corresponding to disabled protocols.
✘ Incorrect. Blocking protocols is handled through firewall policies or application control, not protocol options. Protocol options do not provide a "disable protocol" mechanism.

C. Protocol options allow administrators to configure the Any setting for all enabled protocols, which provides the most efficient use of system resources.
✘ Incorrect. There is no “Any” setting in protocol options. Efficiency is achieved through proper configuration of inspection profiles and hardware acceleration, not by protocol options.

D. Protocol options allow administrators to configure which Layer 4 port numbers map to upper-layer protocols, such as HTTP, SMTP, FTP, and so on.
✔ Correct. This is the primary purpose of protocol options. For example, administrators can specify that HTTP traffic is inspected on TCP port 8080 in addition to the default port 80.

References:
FortiOS 7.6 Administration Guide – Security Profiles > Protocol Options
Fortinet KB: Protocol Options Overview and Configuration

Refer to the exhibit, which shows one way communication of the downstream FortiGate with the upstream FortiGate within a Security Fabric.

What three actions must you take to ensure successful communication? (Choose three.)



A. You must authorize the downstream FortiGate on the root FortiGate.


B. FortiGate must not be in NAT mode.


C. Ensure TCP port 8013 is not blocked along the way.


D. You must enable Security Fabric/Fortitelemetry on the receiving interface of the upstream FortiGate.


E. Ensure the port for Neighbor Discovery has been changed.





A.
  You must authorize the downstream FortiGate on the root FortiGate.

C.
  Ensure TCP port 8013 is not blocked along the way.

D.
  You must enable Security Fabric/Fortitelemetry on the receiving interface of the upstream FortiGate.

Explanation:

A: Authorize downstream on root FortiGate.
The upstream (root) FortiGate must approve the downstream device in the Security Fabric so it can join and exchange fabric telemetry. Without authorization, handshakes will not complete.

C: Ensure TCP port 8013 is not blocked.
Security Fabric uses TCP 8013 for FortiTelemetry/control. The sniffer shows repeated SYNs to 8013 with no SYN-ACK, indicating the path or the upstream device is not accepting or the port is filtered. Unblock/allow 8013 end-to-end.

D: Enable Security Fabric/Fortitelemetry on the upstream’s receiving interface.
Fabric communication is interface-bound. Telemetry must be enabled on the interface that receives the downstream FortiGate’s traffic; otherwise, the upstream won’t respond on 8013.

Why the other options are incorrect

B: FortiGate must not be in NAT mode.
Fabric works in both NAT and transparent modes. NAT mode does not prevent Security Fabric communication.

E: Ensure the port for Neighbor Discovery has been changed.
Changing neighbor discovery ports is not required for basic Fabric telemetry; the critical requirement is allowing/using the default 8013 and enabling telemetry on the correct interface.

Page 4 out of 14 Pages
PreviousNext
1234567
FCSS_NST_SE-7.6 Practice Test Home

Why Prepare with PrepForti FCSS_NST_SE-7.6 Practice Test?

Choosing the right preparation material is critical for passing the FCSS - Network Security 7.6 Support Engineer exam. Here’s how our FCSS_NST_SE-7.6 practice test is designed to bridge the gap between knowledge and a passing score.

Experience the Real Exam Format:


Familiarize yourself with the exact style, difficulty, and question types you will encounter on the official Fortinet exam. Our Free FCSS - Network Security 7.6 Support Engineer FCSS_NST_SE-7.6 test questions, like the samples on this page, cover specific technical scenarios and MCQs to ensure there are no surprises on test day.

Turn Knowledge into Application:


The smartest way to prepare isn't just reading - it's practicing. Our FCSS - Network Security 7.6 Support Engineer practice exam transforms your theoretical understanding into practical problem-solving skills, exactly what is required to pass.

Learn with Detailed Explanations:


All FCSS_NST_SE-7.6 exam questions comes with a comprehensive summary and a breakdown of why the correct option is right and the others are wrong. This detailed feedback helps you identify your strengths and target your weaknesses, making your FCSS - Network Security 7.6 Support Engineer study time far more efficient.



Experience the Real Exam Now!