New Year Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Fortinet NSE 6 - Network Security 7.6 Support Engineer Question and Answers

Fortinet NSE 6 - Network Security 7.6 Support Engineer

Last Update Jan 14, 2026
Total Questions : 101

We are offering FREE FCSS_NST_SE-7.6 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare FCSS_NST_SE-7.6 free exam questions and then go for complete pool of Fortinet NSE 6 - Network Security 7.6 Support Engineer test questions that will help you more.

FCSS_NST_SE-7.6 pdf

FCSS_NST_SE-7.6 PDF

$36.75  $104.99
FCSS_NST_SE-7.6 Engine

FCSS_NST_SE-7.6 Testing Engine

$43.75  $124.99
FCSS_NST_SE-7.6 PDF + Engine

FCSS_NST_SE-7.6 PDF + Testing Engine

$57.75  $164.99
Questions 1

Refer to the exhibits.

An administrator Is expecting to receive advertised route 8.8.8.8/32 from FGT-A. On FGT-B, they confirm that the route is being advertised and received, however, the route is not being injected into the routing table. What is the most likely cause of this issue?

Options:

A.  

A batter route to the 8.8.8.8/32 network exists in the routing table.

B.  

FGT-B is configured with a prefix list denying the 8.8.8.8/32 network to be injected into the routing table.

C.  

The administrator has misconfigured redistribution of routes on FGT-A.

D.  

FGT-B is configured with a distribution list denying the 8.8.8.8/32 network to be injected into the routing table.

Discussion 0
Questions 2

Refer to the exhibit, which contains partial output from an IKE real-time debug.

The administrator does not have access to the remote gateway.

Based on the debug output, which configuration change the administrator make to the local gateway to resolve the phase 1 negotiation error?

Options:

A.  

In the phase 1 proposal configuration, add AES256-SHA256 to the list of encryption algorithms.

B.  

In the phase 1 proposal configuration, add AESCBC-SHA2 to the list of encryption algorithms.

C.  

In the phase 1 network configuration, set the IKE version to 2.

D.  

In the phase 1 proposal configuration, add AES128-SHA128 to the list of encryption algorithms.

Discussion 0
Questions 3

Refer to the exhibit, which shows the partial output of a real-time OSPF debug.

Why are the two FortiGate devices unable to form an adjacency?

Options:

A.  

The Hello packet is being sent from an OSPF router with ID 0.0.0.112.

B.  

The two FortiGate devices attempting adjacency are in area 0.0.0.0.

C.  

One FortiGate device is configured to require authentication, while the other is not.

D.  

The passwords on the FortiGate devices do not match.

Discussion 0
Questions 4

Refer to the exhibit.

The administrator did not override the FortiGuard FODN or IP address in the FortiGate configuration

Which IP address did FortiGate get when resolving the servicem,fortiguard.net name?

Options:

A.  

208.91.112.194

B.  

209.22.147.36

C.  

64.26.151.37

D.  

96.45.33.65

Discussion 0
Questions 5

Refer to the exhibit, which shows the modified output of the routing kernel.

Which statement is true?

Options:

A.  

The egress interface associated with static route 8.8.8.8/32 is administratively up.

B.  

The default static route through 10.200.1.254 is not in the forwarding information base.

C.  

The default static route through port2 is in the forwarding information base.

D.  

The BGP route to 10.0.4.0/24 is not in the forwarding information base.

Discussion 0
Questions 6

Refer to the exhibit showing a debug output.

An administrator deployed FSSO in DC Agent Mode but FSSO is failing on FortiGate. Pinging FortiGate from where the collector agent is deployed is successful.

The administrator then produces the debug output shown in the exhibit.

What could be causing this error message?

Options:

A.  

The TCP port 445 is blocked between FortiGate and collector agent.

B.  

The collector agent preshared password is mismatched.

C.  

The FortiGate cannot resolve the active directory server name.

D.  

The FortiGate and the collector agent are using different TCP ports.

Discussion 0
Questions 7

Refer to the exhibit.

The output of diagnose sys session list command is shown.

If the HA ID for the primary device is 9, what happens if the primary fails and the secondary becomes the primary?

Options:

A.  

The session is synchronized with the secondary device, however, because application control is applied. the session is marked dirty and has to be reevaluated after failover.

B.  

The session will be removed from the session table of the secondary device because the TCP session is not yet fully established.

C.  

The session continues to permit traffic on the new primary device after failover. without requiring the client to restart the session with the server.

D.  

The session state is preserved but the kernel will re-evaluate the session because the routing information will be flushed

Discussion 0
Questions 8

What is an accurate description of LDAP authentication using the regular bind type?

Options:

A.  

The regular bind requires the client to send the full distinguished name (ON).

B.  

The regular bind type is the easiest bind type to configure on ForbOS.

C.  

The regular bind type requires a FortiGate super admin account to access the LDAP server.

D.  

It is not often used as a bind type

Discussion 0
Questions 9

Exhibit.

Refer to the exhibit, which shows a partial web fillet profile configuration.

Which action does FortiGate lake if a user attempts to access www. dropbox. com, which is categorized as File Sharing and Storage?

Options:

A.  

FortiGate allows the connection, based on the URL Filter configuration.

B.  

FortiGate blocks the connection as an invalid URL.

C.  

FortiGate exempts the connection, based on the Web Content Filter configuration.

D.  

FortiGate blocks the connection, based on the FortiGuard category based filter configuration.

Discussion 0
Questions 10

Refer to the exhibit.

A partial output of diagnose npu up6 port-list on FortiGate 2000E is shown.

An administrator is unable to analyze traffic flowing between port1 and port17 using the diagnose sniffer command.

Which two commands allow the administrator to view the traffic? (Choose two.)

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 11

Refer to the exhibit, which shows the output of get router info bgp summary.

Which two statements are true? (Choose two.)

Options:

A.  

The local ForliGate has received one prefix from BGP neighbor 100.64.1.254.

B.  

The TCP connection with BGP neighbor 100.64.2.254 was successful.

C.  

The local FortiGate has received 18 packets from a BGP neighbor.

D.  

The local FortiGate is still calculating the prefixes received from BGP neighbor 100.64.2.264

Discussion 0
Questions 12

Refer to the exhibit, which shows a partial output of the fssod daemon real-time debug command.

What two conclusions can you draw from the output? (Choose two.)

Options:

A.  

The workstation with IP 10.124.2.90 will be polled frequently using TCP port 445 to see if the user is still logged on.

B.  

The logon event can be seen on the collector agent installed on Windows.

C.  

FSSO is using DC agent mode to detect logon events.

D.  

FSSO is using agentless polling mode to detect logon events.

Discussion 0
Questions 13

Refer to the exhibit, which shows a session entry.

Which statement about this session is true?

Options:

A.  

Return traffic to the initiator is sent to 10.1.0.1.

B.  

Return traffic to the initiator is sent lo 10.200.1.254.

C.  

It is an ICMP session from 10.1.10.10 to 10.200.1.1.

D.  

It is an ICMP session from 10.1.10.1 to 10.200.5.1.

Discussion 0
Questions 14

Which two statements about conserve mode are true? (Choose two.)

Options:

A.  

FortiGate enters conserve mode when the system memory reaches the configured extreme threshold.

B.  

FortiGate starts taking the configured action for new sessions requiring content inspection when the system memory reaches the configured red threshold.

C.  

FortiGate exits conserve mode when the system memory goes below the configured green threshold.

D.  

FortiGate starts dropping all new sessions when the system memory reaches the configured red threshold.

Discussion 0
Questions 15

While troubleshooting a FortiGate web filter issue, users report that they cannot access any websites, even though those sites are not explicitly blocked by any web filter profiles that are applied to firewall policies.

What are the three most likely reasons for this behavior? (Choose three answers)

Options:

A.  

The web filter cache has been cleared causing all websites to take longer to be rated.

B.  

The SSL/TLS deep inspection was configured but the browsers do not have the FortiGate certificate installed.

C.  

The webfilter-force-off setting has been enabled under config system fortiguard.

D.  

The DNS server is unreachable, preventing URL resolution.

E.  

The FortiGuard Web Filtering license has expired, causing FortiGate to apply the default block action.

Discussion 0
Questions 16

Refer to the exhibit.

Partial output of diagnose sys session stat command is shown.

An administrator has noticed unusual behavior from FortiGate. It appears that sessions are randomly removed. Which two reasons could explain this? (Choose two.)

Options:

A.  

FortiGate is deleting sessions because the kernel cannot allocate more memory pages

B.  

FortiGate is dropping all TCP sessions with incomplete three-way handshakes.

C.  

FortiGate is not accepting sessions because the device has been down 10 out of 120 seconds.

D.  

FortiGate is flushing sessions because of high memory usage.

Discussion 0
Questions 17

Refer to the exhibit, which shows the output of the command get router info ospf neighbor.

To what extent does FortiGate operate when looking at its OSPF neighbors? (Choose two.)

Options:

A.  

The local FortiGate has at least one interface that participates in a broadcast network.

B.  

The local FortiGate has at least one interface that participates in a point-to-point network.

C.  

The local FortiGate is the DR.

D.  

Neighbor 0.0.0.18 is the designated router (DR).

Discussion 0
Questions 18

Refer to the exhibit, which shows a partial web filter profile configuration.

The URL www.dropbox.com is categorized as File Sharing and Storage.

Which action does FortiGate take if a user attempts to access www.dropbox.com?

Options:

A.  

FortiGate blocks the connection as an invalid URL.

B.  

Based on the URL Filter configuration, FortiGate allows the connection.

C.  

FortiGate blocks the connection, based on the FortiGuard category-based filter configuration.

D.  

Based on the Web Content filter configuration, access to www.dropbox.com would be exempted.

Discussion 0
Questions 19

Refer to the exhibit, which shows a partial output of the real-time LDAP debug.

What two actions can the administrator take to resolve this issue? (Choose two.)

Options:

A.  

Ensure the user logs in using 'John Smith' not 'jsmith'.

B.  

Ensure the user is providing the correct user credentials.

C.  

Ensure the user is a member of at least one AD group to ensure step 4 of the LDAP authentication process is successful.

D.  

Ensure the account is active.

Discussion 0
Questions 20

Exhibit 1.

Exhibit 2.

Refer to the exhibits, which show the configuration on FortiGate and partial internet session information from a user on the internal network.

An administrator would like to lest session failover between the two service provider connections.

Which two changes must the administrator make to force this existing session to immediately start using the other interface? (Choose two.)

Options:

A.  

Change the priority of the port1 static route to 11.

B.  

Change the priority of the port2 static route to 5.

C.  

Configure unset snat-route-change to return it to the default setting.

D.  

Configure set snat-route-change enable.

Discussion 0
Questions 21

Exhibit.

Refer to the exhibit, which shows two entries that were generated in the FSSO collector agent logs.

What three conclusions can you draw from these log entries? {Choose three.)

Options:

A.  

Remote registry is not running on the workstation.

B.  

The user's status shows as "not verified" in the collector agent.

C.  

DNS resolution is unable to resolve the workstation name.

D.  

The FortiGate firmware version is not compatible with that of the collector agent.

E.  

A firewall is blocking traffic to port 139 and 445.

Discussion 0
Questions 22

Refer to the exhibit.

Assuming a default configuration, which three statements are true? (Choose three.)

Options:

A.  

Strict RPF is enabled by default.

B.  

User B: Fail. There is no route to 95.56.234.24 using wan2 in the routing table.

C.  

User A: Pass. The default static route through wan1 passes the RPF check regardless of the source IP address.

D.  

User B: Pass. FortiGate will use asymmetric routing using wan1 to reply to traffic for 95.56.234.24.

E.  

User C: Fail. There is no route to 10.0.4.63 using port1 in the touting table.

Discussion 0
Questions 23

Exhibit.

Refer to the exhibit, which shows a FortiGate configuration.

An administrator is troubleshooting a web filter issue on FortiGate. The administrator has configured a web filter profile and applied it to a policy; however the web filter is not inspecting any traffic that is passing through the policy.

What must the administrator do to fix the issue?

Options:

A.  

Disable webfilter-force-off.

B.  

Increase webfilter-timeout.

C.  

Enable fortiguard-anycast.

D.  

Change protocol to TCP.

Discussion 0
Questions 24

Refer to the exhibit, which shows the port1 interface configuration on FortiGate and partial session information for ICMP traffic.

What happens to the session information if a routing change occurs that affects this session?

Options:

A.  

Only the interface and gateway information for dev=7 will be removed.

B.  

The session information will not change unless the current route has been removed from the routing table.

C.  

The session will be flagged as dirty but no route lookups will be performed.

D.  

Sessions involving port7 or port19 will not have their routing information flushed.

Discussion 0
Questions 25

Which exchange lakes care of DoS protection in IKEv2?

Options:

A.  

Create_CHILD_SA

B.  

IKE_Auth

C.  

IKE_Req_INIT

D.  

IKE_SA_NIT

Discussion 0
Questions 26

Refer to the exhibit.

The sniffer log on two FortiGate devices are shown. Based on the information in the log, which two factors explain the output on FortiGate FGT-02? (Choose two answers)

Options:

A.  

A third-party device is blocking protocol 50.

B.  

The administrator has not yet configured the VPN tunnel on FGT-02.

C.  

The administrator configured the wrong remote peer IP address on FGT-01.

D.  

The administrator set the wrong sniffer filter on FGT-02.

Discussion 0
Questions 27

Consider the scenario where the server name indication (SNI) does not match either the common name (CN) or any of the subject alternative names (SAN) in the server certificate. Which two actions will FortiGate take when using the default settings for SSL certificate inspection? (Choose two answers)

Options:

A.  

FortiGate uses the SNI from the user's web browser.

B.  

FortiGate does not decrypt the traffic if the traffic is blocked by the web filter profile.

C.  

FortiGate uses the CN information from the Subject field in the server certificate.

D.  

FortiGate does not decrypt the traffic if the traffic is allowed by the web filter profile.

Discussion 0
Questions 28

Refer to the exhibit.

The output of the command diagnose vpn tunnels liar is shown.

Which two statements accurately describe the status of the tunnel? (Choose two.)

Options:

A.  

Phase 2 is down

B.  

Phase 1 is down.

C.  

There is currently no traffic traversing the tunnel

D.  

Both Phase 1 and Phase 2 were negotiated successfully.

Discussion 0
Questions 29

Which three common FortiGate-to-collector-agent connectivity issues can you identify using the FSSO real-time debug? (Choose three.)

Options:

A.  

Log is full on the collector agent.

B.  

Inability to reach IP address of the collector agent.

C.  

Refused connection. Potential mismatch of TCP port.

D.  

Mismatched pre-shared password.

E.  

Incompatible collector agent software version.

Discussion 0
Questions 30

What are two functions of automation stitches? (Choose two.)

Options:

A.  

You can configure automation stitches on any FortiGate device in a Security Fabric environment.

B.  

You can configure automation stitches to execute actions sequentially by taking parameters from previous actions as input for the current action.

C.  

You can set an automation stitch configured to execute actions in parallel to insert a specific delay between actions.

D.  

You can create automation stitches to run diagnostic commands and attach the results to an email message when CPU or memory usage exceeds specified thresholds.

Discussion 0