Fortinet FCP_FGT_AD-7.4 Exam
FCP - FortiGate 7.4 Administrator (Page 9 )

Updated On: 7-Feb-2026

Refer to the exhibits.







The exhibits show a diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device.

Two PCs, PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.

Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)

  1. In the firewall policy configuration, add 10. o. l. 3 as an address object in the source field.
  2. In the IP pool configuration, set endig to 192.2.0.12.
  3. Configure another firewall policy that matches only the address of PC3 as source, and then place the policy on top of the list.
  4. In the IP pool configuration, set cype to overload.

Answer(s): B,D

Explanation:

To resolve the issue of PC3 not being able to access the internet, the administrator needs to adjust the IP pool configuration or the firewall policy. The following two options will fix the connectivity issue:
B . In the IP pool configuration, set the ending IP to 192.2.0.12: The current IP pool range is 192.2.0.10-192.2.0.11, which only provides two IP addresses for network address translation (NAT). To allow PC3 to access the internet, the IP pool should be expanded to include an additional IP address by changing the end of the range to 192.2.0.12. D . In the IP pool configuration, set type to overload: Instead of using a one-to-one NAT, changing the type to overload will allow multiple internal addresses (such as PC1, PC2, and PC3) to share a single external IP address. This will solve the issue without needing additional public IP addresses.
The other options are not suitable:
A . In the firewall policy configuration, add 10.0.1.3 as an address object in the source field: This option is unnecessary since the firewall policy already allows all addresses from the source (LAN port3).
C . Configure another firewall policy that matches only the address of PC3 as the source, and then place the policy on top of the list: This option is redundant and would not resolve the underlying issue with the IP pool configuration.
Reference
FortiOS 7.4.1 Administration Guide - Configuring Firewall Policies, page 512. FortiOS 7.4.1 Administration Guide - Configuring NAT with IP Pools, page 518.



Which method allows management access to the FortiGate CLI without network connectivity?

  1. SSH console
  2. CLI console widget
  3. Serial console
  4. Telnet console

Answer(s): C

Explanation:

The serial console method allows management access to the FortiGate CLI without relying on network connectivity. This method involves directly connecting a computer to the FortiGate device using a serial cable (such as a DB-9 to RJ-45 cable or USB to RJ-45 cable) and using terminal emulation software to interact with the FortiGate CLI. This method is essential for situations where network-based access methods (such as SSH or Telnet) are not available or feasible.


Reference:

FortiOS 7.4.1 Administration Guide: Console connection



Refer to the exhibit.



In the network shown in the exhibit, the web client cannot connect to the HTTP web server. The administrator runs the FortiGate built-in sniffer and gets the output shown in the exhibit.

What should the administrator do next, to troubleshoot the problem?

  1. Execute a debug flow.
  2. Capture the traffic using an external sniffer connected to part1.
  3. Execute another sniffer on FortiGate, this time with the filter "hose 10.o.1.10".
  4. Run a sniffer on the web server.

Answer(s): A

Explanation:

The sniffer output shows that packets from the web client are reaching the FortiGate and being forwarded to the web server, but there is no indication that the web server is responding. To troubleshoot this issue, executing a debug flow will help analyze the traffic path and pinpoint where the problem might be occurring, such as a possible issue in firewall policy or route settings that is causing the server not to respond correctly.


Reference:

FortiOS 7.4.1 Administration Guide: Troubleshooting network connectivity



Refer to the exhibit.

The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile.

An administrator must block access to download.com, which belongs to the Freeware and Software

Downloads category. The administrator must also allow other websites in the same category.

What are two solutions for satisfying the requirement? (Choose two.)

  1. Configure a separate firewall policy with action Deny and an FQDN address object for *. download, com as destination address.
  2. Set the Freeware and Software Downloads category Action to Warning
  3. Configure a web override rating for download, com and select Malicious Websites as the subcategory.
  4. Configure a static URL filter entry for download, com with Type and Action set to Wildcard and Block, respectively.

Answer(s): C,D



A network administrator wants to set up redundant IPsec VPN tunnels on FortiGate by using two IPsec VPN tunnels and static routes.
All traffic must be routed through the primary tunnel when both tunnels are up. The secondary tunnel must be used only if the primary tunnel goes down. In addition, FortiGate should be able to detect a dead tunnel to speed up tunnel failover.
Which two key configuration changes must the administrator make on FortiGate to meet the requirements? (Choose two.)

  1. Enable Dead Peer Detection
  2. Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels.
  3. Configure a lower distance on the static route for the primary tunnel, and a higher distance on the static route for the secondary tunnel.
  4. Configure a higher distance on the static route for the primary tunnel, and a lower distance on the static route for the secondary tunnel.

Answer(s): A,C

Explanation:

To configure redundant IPsec VPN tunnels on FortiGate with failover capability, the following two key configuration changes are required:
A . Enable Dead Peer Detection (DPD): Dead Peer Detection is crucial for detecting if the remote peer is unreachable. By enabling DPD, FortiGate can quickly detect a dead tunnel, ensuring a faster failover to the secondary tunnel when the primary tunnel goes down. C . Configure a lower distance on the static route for the primary tunnel and a higher distance on the static route for the secondary tunnel: The static route with the lower distance (higher priority) will be used when both tunnels are operational. If the primary tunnel fails, the higher distance (lower priority) route for the secondary tunnel will take over, ensuring traffic is routed correctly.
The other options are not suitable:

B . Enable Auto-negotiate and Autokey Keep Alive on the phase 2 configuration of both tunnels: This option is not directly related to the requirements of failover between two IPsec VPN tunnels. D . Configure a higher distance on the static route for the primary tunnel and a lower distance on the static route for the secondary tunnel: This would prioritize the secondary tunnel over the primary tunnel, which is opposite to the desired configuration.
Reference
FortiOS 7.4.1 Administration Guide - Configuring IPsec VPN, page 1320. FortiOS 7.4.1 Administration Guide - Redundant VPN Configuration, page 1335.



Viewing page 9 of 19
Viewing questions 41 - 45 out of 89 questions



Post your Comments and Discuss Fortinet FCP_FGT_AD-7.4 exam prep with other Community members:

Join the FCP_FGT_AD-7.4 Discussion