Last Updated On : 13-Jan-2026


Fortinet Fortinet NSE 7 - Public Cloud Security 7.6.4 Architect - NSE7_CDS_AR-7.6 Practice Questions

Total 54 Questions



The smartest way to prepare for your Fortinet NSE7_CDS_AR-7.6 exam isn't just reading—it's practicing. Our Fortinet Fortinet NSE 7 - Public Cloud Security 7.6.4 Architect practice test bridge gap, transforming your knowledge into a passing score. Familiarize yourself with the exact style and difficulty of the real Fortinet NSE7_CDS_AR-7.6 practice questions, so there are no surprises. Get detailed feedback to identify your strengths and target your weaknesses, making your study time more efficient.

You need a solution to safeguard public cloud-hosted web applications from the OWASP Top 10 vulnerabilities. The solution must support the same region in which your applications reside, with minimum traffic cost. Which solution meets the requirements?



A. Use FortiGate


B. Use FortiCNP


C. Use FortiWeb


D. Use FortiADC





C.
  Use FortiWeb

Explanation:

✅ Correct Answer: C - Use FortiWeb
FortiWeb serves as Fortinet's dedicated Web Application Firewall (WAF) solution, specifically engineered to protect public cloud-hosted web applications against OWASP Top 10 vulnerabilities such as SQL injection, XSS, and broken access control. Deployable as FortiWeb Cloud WAF-as-a-Service in major cloud providers like AWS, Azure, and Google Cloud, it operates within the same region as applications to minimize latency and traffic costs through regional scrubbing. Machine learning-based anomaly detection and FortiGuard threat intelligence ensure comprehensive, low-overhead protection with rapid deployment. ​

❌ Incorrect answer: A - Use FortiGate
FortiGate functions primarily as a next-generation firewall (NGFW) focused on network-level security, perimeter defense, VPN, and SD-WAN capabilities rather than specialized web application layer protection. While it offers some web filtering and application control, it lacks the deep OWASP Top 10 mitigation features like signature-based attack blocking and behavioral analysis required for web apps. Regional cloud deployment exists but incurs higher traffic costs compared to purpose-built WAFs, making it suboptimal for this specific use case. ​

❌ Incorrect answer: B - Use FortiCNP
FortiCNP (Fortinet Cloud Native Protection) provides cloud security posture management (CSPM) and broader cloud workload protection, focusing on misconfigurations, compliance, and runtime threat detection across multi-cloud environments. It does not deliver dedicated WAF functionality for OWASP Top 10 web vulnerabilities at the application layer. While regionally aware, its scope emphasizes governance over real-time traffic inspection, failing to meet the low-cost, same-region web app safeguarding requirements. ​

❌ Incorrect answer: D - Use FortiADC
FortiADC is an application delivery controller (ADC) optimized for load balancing, traffic management, global server load balancing (GSLB), and application acceleration. It includes basic security like SSL offloading but lacks comprehensive OWASP Top 10 defenses such as advanced input validation or bot mitigation. Primarily hardware/virtual appliance-based, it does not natively support cloud-native, same-region WAF-as-a-Service deployment with minimal traffic costs. ​

🔧 Conclusion:
FortiWeb best aligns with safeguarding cloud web apps from OWASP Top 10 by providing a cloud-native WAF with regional deployment for optimal performance and cost efficiency. Other options fall short: FortiGate is network-focused, FortiCNP is posture-oriented, and FortiADC prioritizes delivery over security. This selection ensures robust, scalable protection without re-architecting environments, leveraging Fortinet's integrated Security Fabric for holistic defense.

Reference:
Web Application Firewall

Refer to the exhibit.

In your Amazon Web Services (AWS), you must allow inbound HTTPS access to the Customer VPC FortiGate VM from the internet. However, your HTTPS connection to the FortiGate VM in the Customer VPC is not successful.
Also, you must ensure that the Customer VPC FortiGate VM sends all the outbound Internet traffic through the Security VPC. How do you correct this issue with minimal configuration changes? (Choose three.)



A. Add a route with your local internet public IP address as the destination and the internet gateway as the target.


B. Add a route with your local internet public IP address as the destination and the transit gateway as the target.


C. Add a route to the destination 0.0.0.0/0 with the transit gateway as the target.


D. Deploy an internet gateway, associate an EIP with the Customer VPC private subnet, and then add a new route with destination 0.0.0.0/0 with the internet gateway as the target.


E. Deploy an internet gateway, attach it to the Customer VPC, and then associate an EIP with the port1 of the FortiGate in the Customer VPC.





A.
  Add a route with your local internet public IP address as the destination and the internet gateway as the target.

C.
  Add a route to the destination 0.0.0.0/0 with the transit gateway as the target.

E.
  Deploy an internet gateway, attach it to the Customer VPC, and then associate an EIP with the port1 of the FortiGate in the Customer VPC.

Explanation:

✅ Correct Answer:

A. Add a route with your local internet public IP address as the destination and the internet gateway as the target.
This route ensures symmetric routing for your HTTPS management session. Inbound traffic from your public IP reaches the FortiGate via the new IGW and EIP. Without this, the default route sends responses via the TGW to the Security VPC, causing asymmetry and connection failure. Adding a specific /32 route for your IP to the IGW lets responses return directly, fixing the issue with minimal change while preserving overall outbound policy.

C. Add a route to the destination 0.0.0.0/0 with the transit gateway as the target.
This default route in the Customer VPC route table directs all outbound internet traffic from the FortiGate VM through the TGW to the Security VPC for centralized inspection and egress. It meets the requirement without altering existing setups, ensuring non-management outbound flows are secured. This is essential as the current topology likely lacks this route, allowing direct or no outbound.

E. Deploy an internet gateway, attach it to the Customer VPC, and then associate an EIP with the port1 of the FortiGate in the Customer VPC.
Attaching an IGW makes the Customer VPC internet-facing, and assigning an EIP to port1 (the public interface) provides a static public IP for inbound HTTPS access. The exhibit shows no IGW in Customer VPC, explaining the failed connection. This minimal addition enables direct internet reachability to the FortiGate without redesigning subnets or adding unnecessary routes.

❌ Incorrect answer

B. Add a route with your local internet public IP address as the destination and the transit gateway as the target.
Routing your public IP via TGW forces management response traffic through the Security VPC, exacerbating asymmetric routing since inbound arrives directly via IGW. This doesn't fix the connection failure and could introduce inspection or NAT issues in Security VPC not intended for management. It's too specific and misdirected, not addressing symmetry needed for successful HTTPS.

D. Deploy an internet gateway, associate an EIP with the Customer VPC private subnet, and then add a new route with destination 0.0.0.0/0 with the internet gateway as the target.
EIPs associate with interfaces, not subnets, making this invalid. Adding 0.0.0.0/0 to IGW bypasses the Security VPC for all outbound, violating the requirement to route through it. The FortiGate's port2 is in private subnet, but inbound targets port1; this misconfigures egress and doesn't enable proper public access.

🔧 Conclusion:
The core problems are no public exposure for inbound HTTPS (no IGW/EIP) and missing centralized outbound routing, plus potential asymmetry for management. A, C, and E resolve this minimally: E enables inbound, C enforces outbound via Security, and A ensures symmetric paths for your session responses. B and D are distractors—B worsens routing, D breaks rules and mechanics. This aligns with hub-spoke designs in AWS Transit Gateway setups.

Reference:
FortiGate / FortiOS 7.6.0 AWS Administration Guide (sections on deploying FortiGate-VM with EIP, IGW integration, and Transit Gateway routing for centralized security).

An administrator decides to use the Use managed identity option on the FortiGate SDN connector with Microsoft Azure. However, the SDN connector is failing on the connection. What must the administrator do to correct this issue?



A. Make sure to add the Client secret on FortiGate side of the configuration.


B. Make sure to add the Tenant ID on FortiGate side of the configuration.


C. Make sure to enable the system assigned managed identity on Azure.


D. Make sure to set the type to system managed identity on FortiGate SDN connector settings.





C.
  Make sure to enable the system assigned managed identity on Azure.

Explanation:

The failure occurs because managed identity authentication depends entirely on Azure-side configuration. FortiGate does not store secrets, tenant IDs, or identity types when managed identity is used. The administrator must enable the system-assigned managed identity on the Azure resource so Azure can issue tokens to FortiGate. Without this step, the SDN connector cannot authenticate, regardless of FortiGate configuration changes.

✅ Correct Answer: C
When using managed identity with the FortiGate Azure SDN connector, authentication relies entirely on Azure’s managed identity service. If the system-assigned managed identity is not enabled on the Azure resource (for example, the FortiGate VM), Azure cannot issue an access token. As a result, the SDN connector fails to authenticate. Enabling the system-assigned managed identity in Azure is mandatory for FortiGate to securely access Azure APIs without credentials.

❌ Incorrect Answer: A
A client secret is used only with service principal–based authentication, not with managed identities. Managed identity explicitly removes the need for secrets or certificates. Adding a client secret on the FortiGate side contradicts the managed identity design and has no effect on authentication. FortiGate will still fail to connect because Azure does not expect or validate client secrets when managed identity is selected.

❌ Incorrect Answer: B
The tenant ID is required when authenticating with a service principal. However, when using a system-assigned managed identity, Azure automatically determines the tenant context. FortiGate does not require a manually configured tenant ID for managed identity authentication. Adding or modifying the tenant ID on FortiGate does not resolve the issue because the failure occurs due to missing identity enablement in Azure.

❌ Incorrect Answer: D
FortiGate automatically understands the identity type when Use managed identity is selected in the SDN connector. There is no separate or manual configuration required to set the identity type to system-managed. If the Azure-side managed identity is disabled, changing FortiGate connector settings alone will not fix the connection failure.

Reference:
Fortinet Documentation – FortiGate SDN Connector for Microsoft Azure (Managed Identity)
Fortinet Documentation – FortiGate 7.6 Administration Guide

How does an administrator secure container environments in Amazon AWS from newly emerged security threats? (Choose one answer)



A. Using Docker-related application control signatures.


B. Using Amazon AWS-related application control signatures.


C. Using distributed network-related application control signatures.


D. Using Amazon AWS_S3-related application control signatures.





A.
  Using Docker-related application control signatures.

Explanation:

To secure containers in AWS, the focus must be on the container runtime and orchestration layer. FortiGate integrates with the environment and uses purpose-built Docker-related application control signatures within its Intrusion Prevention System (IPS) to identify and mitigate threats targeting the container infrastructure directly, providing precise and updated security as new vulnerabilities are discovered.

✅ Correct Answer:

A. Using Docker-related application control signatures.
Fortinet's FortiGate can inspect container traffic by leveraging the Docker-specific application control signatures within its IPS engine. These signatures are designed to detect and block known vulnerabilities, exploits, and malicious activities targeting Docker container APIs, daemons, and orchestration systems. When new threats emerge, FortiGuard Labs updates these specific signatures, allowing the FortiGate to immediately protect the container environment without relying on generic network signatures. This provides targeted security for the unique protocols and services used in container ecosystems.

❌ Incorrect Answers:

B. Using Amazon AWS-related application control signatures. These signatures are tailored for securing interactions with AWS control plane APIs (e.g., EC2, IAM) and management services, not for securing the internal application traffic or vulnerabilities within the container workloads themselves.

C. Using distributed network-related application control signatures. This is a distracter. While general network IPS signatures offer broad protection, they are not optimized for the specific application-layer protocols (like the Docker API) and threat patterns unique to container environments.

D. Using Amazon AWS_S3-related application control signatures. These signatures specifically protect against threats related to Amazon S3 bucket interactions, such as data exfiltration or policy violations. They do not address runtime threats within containerized applications.

Reference:
Fortinet Document Library: FortiGate Application Control Guide.

Refer to the exhibit.

A FortiCNAPP administrator used the FortiCNAPP Explorer to reveal all hosts exposed to the internet that are running active packages with vulnerabilities of all severity levels. Why do only the first two results have an attack path? (Choose one answer)



A. Attack paths are available only for AWS resources with public IP addresses.


B. Attack paths are available only for AWS resources with high impact scores.


C. Attack paths are available only for resources with potential multi-hop exposure.


D. Attack paths are available only for resources that have critical vulnerabilities.





A.
  Attack paths are available only for AWS resources with public IP addresses.

Explanation:

The presence of an Attack Path in the FortiCNAPP Explorer is fundamentally tied to external exposure. Because the administrator filtered for internet-exposed hosts, the system specifically generates paths for those resources that have a Public IP address, as these represent the direct entry points for external attackers. Resources lacking a public IP are not directly reachable from the internet, leading to an attack path count of zero in this context.

🟢 A. Attack paths are available only for AWS resources with public IP addresses.
In FortiCNAPP, an Attack Path represents a visualized sequence of potential exploit steps that an external attacker could take to reach a sensitive resource. For the platform to generate and display such a path in the Explorer, the target resource must be externally reachable. Resources without a public IP address are considered shielded from direct internet-based attacks, so the Explorer does not calculate a direct external attack path for them in this specific view.

🔴 B. Attack paths are available only for AWS resources with high impact scores.
While impact scores help prioritize which vulnerabilities to address first, they do not dictate the availability of an attack path. An attack path is a structural map of reachability, whereas an impact score is a measure of potential damage. A resource with a low impact score can still have an attack path if it is exposed to the internet via a public IP address.

🔴 C. Attack paths are available only for resources with potential multi-hop exposure.
Attack paths are not limited to complex, multi-hop scenarios; even a single-step exposure (e.g., a direct exploit of a service on a public IP) is visualized as an attack path in FortiCNAPP. The primary requirement for the "Attack Path" column to populate in the Explorer is the presence of an external entry point, regardless of how many "hops" follow the initial breach.

🔴 D. Attack paths are available only for resources that have critical vulnerabilities.
FortiCNAPP calculates attack paths based on network reachability and configuration, not just the severity of active packages. Even if a resource only has medium or low-severity vulnerabilities, the system will still generate an attack path if that resource is exposed to the internet. Vulnerability severity influences the risk score within the path, but not the existence of the path itself.

Reference:
FortiCNAPP Administration Guide - Attack Path

The cloud administration team is reviewing an AWS deployment that was done using CloudFormation. The deployment includes six FortiGate instances that required custom configuration changes after being deployed. The team notices that unwanted traffic is reaching some of the FortiGate instances because the template is missing a security group. To resolve this issue, the team decides to update the JSON template with the missing security group and then apply the updated template directly, without using a change set. What is the result of following this approach?



A. If new FortiGate instances are deployed later they will include the updated changes.


B. Some of the FortiGate instances may be deleted and replaced with new copies.


C. The update is applied, and the security group is added to all instances without interruption.


D. CloudFormation rejects the update and warns that a new full stack is required.





B.
  Some of the FortiGate instances may be deleted and replaced with new copies.

Explanation:

✅ Correct Answer: B
When you update a CloudFormation stack directly without using a change set, CloudFormation evaluates which resources need modification. Adding a security group to existing FortiGate EC2 instances often requires replacement because security groups are typically defined at instance launch time. CloudFormation will terminate the existing instances and create new ones with the updated security group configuration. This is problematic because the team made custom configuration changes to the six FortiGate instances after deployment, and those customizations will be lost when instances are replaced.

❌ Incorrect Answer: A
While it's true that future FortiGate instances deployed from the updated template will include the new security group, this answer misses the immediate impact on existing instances. The question asks about the result of applying the updated template to the current deployment, not future deployments. The existing six FortiGate instances with custom configurations are at risk of being replaced, which is the critical issue here. This option ignores the replacement behavior that CloudFormation triggers when certain resource properties are modified.

❌ Incorrect Answer: C
CloudFormation cannot simply add a security group to running EC2 instances without interruption. Security groups are immutable properties that require instance replacement in most scenarios. When you modify properties that require replacement, CloudFormation follows a replacement strategy (either delete-then-create or create-then-delete depending on configuration). The instances won't continue running unchanged while the security group is applied. This answer incorrectly assumes CloudFormation can perform in-place updates for all resource modifications, which isn't how the service handles immutable properties.

❌ Incorrect Answer: D
CloudFormation doesn't reject stack updates or require a completely new stack when you add resources like security groups. Stack updates are a standard CloudFormation operation, and the service is designed to handle incremental changes. CloudFormation will process the update and determine the appropriate actions (update in-place, update with interruption, or replacement) for each affected resource. Rejecting the update entirely would contradict CloudFormation's core functionality of managing infrastructure changes over time through stack updates.

🔧 Conclusion:
The key lesson is understanding CloudFormation's replacement behavior and the importance of using change sets before applying updates. Change sets provide a preview of what CloudFormation will do, showing which resources will be replaced, updated, or deleted. Since the FortiGate instances have custom configurations applied post-deployment, replacing them means losing those customizations. Always use change sets to preview infrastructure changes, especially when dealing with stateful resources or resources with manual configurations that aren't captured in the template.

Reference:
About FortiGate-VM for AWS

You are investigating an attack path for a top risky host. You notice that the Common Vulnerability Scoring System (CVSS) and the vulnerability impact scores are very high. However, the attack path severity for the top risky host itself is low. Which two pieces of contextualized information can help you understand why? (Choose two answers)



A. The FortiCNAPP risk score


B. The package status


C. The vulnerability score


D. The fix version





A.
  The FortiCNAPP risk score

B.
  The package status

Explanation:

✅ Correct Answer:

A. The FortiCNAPP risk score provides a contextualized, holistic view of risk by integrating multiple factors such as asset criticality, exposure, and exploitability, which may explain why the overall attack path severity is low despite high CVSS scores.

B. The package status indicates whether the vulnerable software is actively installed, running, or reachable, which directly affects real-world exploitability and can lower the effective risk even if the vulnerability itself is severe.

❌ Incorrect answer

C. The vulnerability score (such as CVSS) is already stated to be very high in the scenario, so it does not help explain the discrepancy between high vulnerability impact and low attack path severity—it is part of the problem, not the explanation.

D. The fix version tells you what version resolves the vulnerability but does not, by itself, provide contextual insight into why the current attack path severity is low unless combined with deployment or usage data.

🔧 Key Insight:
The apparent contradiction between high vulnerability scores and low attack path severity is resolved by examining contextual risk indicators. FortiCNAPP’s aggregated risk score accounts for environmental and operational factors, while package status reveals whether the vulnerable component is actually active or exposed. Together, they clarify that theoretical severity does not always translate to practical risk in the specific host environment.

Reference:
FortiCNAPP (formerly Lacework) documentation

Page 1 out of 8 Pages

Why Prepare with PrepForti NSE7_CDS_AR-7.6 Practice Test?

Choosing the right preparation material is critical for passing the Fortinet Fortinet NSE 7 - Public Cloud Security 7.6.4 Architect exam. Here’s how our NSE7_CDS_AR-7.6 practice test is designed to bridge the gap between knowledge and a passing score.

Experience the Real Exam Format:


Familiarize yourself with the exact style, difficulty, and question types you will encounter on the official Fortinet exam. Our Fortinet NSE 7 - Public Cloud Security 7.6.4 ArchitectNSE7_CDS_AR-7.6 test questions, like the samples on this page, cover specific technical scenarios and MCQs to ensure there are no surprises on test day.

Turn Knowledge into Application:


The smartest way to prepare isn't just reading - it's practicing. Our Fortinet NSE 7 - Public Cloud Security 7.6.4 Architect practice test questions transforms your theoretical understanding into practical problem-solving skills, exactly what is required to pass.

Learn with Detailed Explanations:


All NSE7_CDS_AR-7.6 exam questions comes with a comprehensive summary and a breakdown of why the correct option is right and the others are wrong. This detailed feedback helps you identify your strengths and target your weaknesses, making your Fortinet NSE 7 - Public Cloud Security 7.6.4 Architect study time far more efficient.



Experience the Real Exam Now!

Fortinet Fortinet NSE 7 - Public Cloud Security 7.6.4 Architect Practice Exam Questions