Fortinet FCP_FGT_AD-7.6 Exam
FCP - FortiGate 7.6 Administrator (Page 4 )

Updated On: 7-Feb-2026

Refer to the exhibit, which shows a partial configuration from the remote authentication server.



Why does the FortiGate administrator need this configuration?

  1. To set up a RADIUS server Secret.
  2. To authenticate Any FortiGate user groups.
  3. To authenticate and match the Training OU on the RADIUS server.
  4. To authenticate only the Training user group.

Answer(s): D

Explanation:

The Fortinet-Group-Name attribute is used to restrict authentication to users who belong specifically to the "Training" user group on the RADIUS server.



Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI.



Based on the exhibit, which statement is true?

  1. The Underlay zone is the zone by default.
  2. The Underlay zone contains no member.
  3. port2 and port3 are not assigned to a zone.
  4. The virtual-wan-link and overlay zones can be deleted.

Answer(s): B



Which three statements explain a flow-based antivirus profile? (Choose three.)

  1. FortiGate buffers the whole file but transmits to the client at the same time.
  2. Flow-based inspection uses a hybrid of the scanning modes available in proxy-based inspection.
  3. If a virus is detected, the last packet is delivered to the client.
  4. Flow-based inspection optimizes performance compared to proxy-based inspection.
  5. The IPS engine handles the process as a standalone.

Answer(s): C,D,E



Refer to the exhibit.



An administrator has configured an Application Overrides for the ABC.Com application signature and set the Action to Allow. This application control profile is then applied to a firewall policy that is scanning all outbound traffic. Logging is enabled in the firewall policy. To test the configuration, the administrator accessed the ABC.Com web site several times.

Why are there no logs generated under security logs for ABC.Com?

  1. The ABC.Com Type is set as Application instead of Filter.
  2. The ABC.Com is configured under application profile, which must be configured as a web filter profile.
  3. The ABCom Action is set to Allow.
  4. The ABC.Com is hitting the category Excessive-Bandwidth.

Answer(s): C

Explanation:

When the action is set to Allow in an application override, traffic matching this override is allowed without generating security logs because it bypasses deeper inspection and blocking.



Which two statements describe characteristics of automation stitches? (Choose two.)

  1. Actions involve only devices included in the Security Fabric.
  2. An automation stitch can have multiple triggers.
  3. Multiple actions can run in parallel.
  4. Triggers can involve external connectors.

Answer(s): C,D

Explanation:

Automation stitches can execute multiple actions concurrently (in parallel).
Triggers for automation stitches can come from external connectors beyond just Fortinet devices.



Viewing page 4 of 27
Viewing questions 16 - 20 out of 128 questions



Post your Comments and Discuss Fortinet FCP_FGT_AD-7.6 exam prep with other Community members:

Join the FCP_FGT_AD-7.6 Discussion