Pre-Summer Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

FCSS_NST_SE-7.6 Fortinet NSE 6 - Network Security 7.6 Support Engineer Questions and Answers

Questions 4

Refer to the exhibit, which a network topology and a partial routing table.

FCSS_NST_SE-7.6 Question 4

FortiGate has already been configured with a firewall policy that allows all ICMP traffic to flow from port1 to port3.

Which changes must the administrator perform to ensure the server at 10.4.0.1/24 receives the echo reply from the laptop at 10.1.0.1/24?

Options:

A.

Enable asymmetric routing under config system settings.

B.

Change the configuration from strict RPF check mode to feasible RPF check mode.

C.

A firewall policy that allows all ICMP traffic from port3 to port1.

D.

Modify the default gateway on the laptop from 10.1.0.2 to 10.2.0.2.

Buy Now
Questions 5

During which phase of IKEv2 does the Diffie-Helman key exchange take place?

Options:

A.

IKE_Req_INIT

B.

Create_CHILD_SA

C.

IKE_Auth

D.

IKE_SA_INIT

Buy Now
Questions 6

Which statement about protocol options is true?

Options:

A.

Protocol options allow administrators to configure a maximum number of sessions for each configured protocol.

B.

Protocol options give administrators a streamlined method to instruct FortiGate to block all sessions corresponding to disabled protocols.

C.

Protocol options allow administrators to configure the Any setting for all enabled protocols, which provides the most efficient use of system resources.

D.

Protocol options allow administrators to configure which Layer 4 port numbers map to upper-layer protocols, such as HTTP, SMTP, FTP, and so on.

Buy Now
Questions 7

What can cause an IKEv2 tunnel to go down after it was initially brought up successfully?

Options:

A.

Mismatched traffic selectors (phase 2 / “quick-mode selectors”) were detected during the CREATE_CHILD_SA exchange.

B.

A mismatched proposal was detected during the IKE_AUTH exchange.

C.

A mismatched pre-shared key was detected during the IKE_AUTH exchange.

D.

A mismatched Diffie-Hellman group was detected during the IKE_SA_INIT exchange.

Buy Now
Questions 8

Which three conditions are required for two FortiGate devices to form an OSPF adjacency? (Choose three answers)

Options:

A.

OSPF link costs match.

B.

OSPF interface priority settings are unique.

C.

OSPF interface network types match.

D.

Authentication settings match.

E.

OSPF router IDs are unique.

Buy Now
Questions 9

Refer to the exhibit.

FCSS_NST_SE-7.6 Question 9

If the default settings are m place, what can you conclude about the conserve mode shown in the exhibit?

Options:

A.

FortiGate is currently allowing new sessions that require flow-based content inspection and blocking sessions that require proxy-based content inspection

B.

FortiGate is currently allowing new sessions and will continue to allow sessions if memory increases another 6%.

C.

FortiGate is currently allowing now sessions that require flow-based or proxy-based content inspection, but is not performing inspection on those sessions.

D.

FortiGate is currently blocking all new sessions regardless of the content inspection requirements or configuration settings because of high memory use.

Buy Now
Questions 10

During the SAML negotiation process, in which section does the Identity Provider (IdP) provide the SAML attributes used in the authentication process to the Service Provider (SP)?

Options:

A.

Bindings HTTP post

B.

Assertion dump

C.

Authentication request

D.

Authentication response

Buy Now
Questions 11

Refer to the exhibit.

FCSS_NST_SE-7.6 Question 11

The output of the get router info bgp summary command is shown.

Which statement regarding adjacencies between the local router and its neighbors is correct?

Options:

A.

The local router and neighbor 100.64.2.254 are unable to establish adjacency until the adjacency with neighbor 100.64.1.254 ceases.

B.

The local router and neighbor 100.64.2.254 are unable to establish adjacency because the TCP session could not be established.

C.

The local router and neighbor 100.64.1.254 established adjacency because the priority of 100.64.1.254 is higher than that of 100.64.2.254.

D.

The local router and neighbor 100.64.2.254 are unable to establish adjacency because AS 100 is already used by neighbor 100.64.1.254.

Buy Now
Questions 12

Refer to the exhibit showing a debug output.

FCSS_NST_SE-7.6 Question 12

An administrator deployed FSSO in DC Agent Mode but FSSO is failing on FortiGate. Pinging FortiGate from where the collector agent is deployed is successful.

The administrator then produces the debug output shown in the exhibit.

What could be causing this error message?

Options:

A.

The TCP port 445 is blocked between FortiGate and collector agent.

B.

The collector agent preshared password is mismatched.

C.

The FortiGate cannot resolve the active directory server name.

D.

The FortiGate and the collector agent are using different TCP ports.

Buy Now
Questions 13

Refer to the exhibits,

FCSS_NST_SE-7.6 Question 13

which show the configuration on FortiGate and partial session information for internet traffic from a user on the internal network. If the priority on route ID 2 were changed from 10 to 0, what would happen to traffic matching that user session? (Choose one answer)

Options:

A.

The session would be deleted, and the client would need to start a new session.

B.

The session would remain in the session table, but its traffic would now egress from both port1 and port2.

C.

The session would remain in the session table, and its traffic would egress from port2.

D.

The session would remain in the session table, and its traffic would egress from port1.

Buy Now
Questions 14

Refer to the exhibit, which shows the omitted output of a session table entry.

FCSS_NST_SE-7.6 Question 14

Which two statements are true? (Choose two.)

Options:

A.

The traffic has been tagged for VLAN 0000.

B.

NP7 is handling offloading of this session.

C.

The traffic matches Policy ID 1.

D.

The session has been offloaded.

Buy Now
Questions 15

Which statement about IKEv2 is true?

Options:

A.

Both IKEv1 and IKEv2 share the feature of asymmetric authentication.

B.

IKEv1 and IKEv2 have enough of the header format in common that both versions can run over the same UDP port.

C.

IKEv1 and IKEv2 use the same TCP port but run on different UDP ports.

D.

IKEv1 and IKEv2 share the concept of phase1 and phase2.

Buy Now
Questions 16

Refer to the exhibit, which shows the output of the command get router info bgp neighbors 100.64.2.254 advertised-routes.

FCSS_NST_SE-7.6 Question 16

What can you conclude from the output?

Options:

A.

The BGP state of the two BGP participants is OpenConfirm.

B.

The router ID of the neighbor is 100.64.2.254.

C.

The BGP neighbor is advertising the 10.20.30.40/24 network to the local router.

D.

The local router is advertising the 10.20.30.40/24 network to its BGP neighbor.

Buy Now
Questions 17

Consider the scenario where the server name indication (SNI) does not match either the common name (CN) or any of the subject alternative names (SAN) in the server certificate. Which two actions will FortiGate take when using the default settings for SSL certificate inspection? (Choose two answers)

Options:

A.

FortiGate uses the SNI from the user ' s web browser.

B.

FortiGate does not decrypt the traffic if the traffic is blocked by the web filter profile.

C.

FortiGate uses the CN information from the Subject field in the server certificate.

D.

FortiGate does not decrypt the traffic if the traffic is allowed by the web filter profile.

Buy Now
Questions 18

Refer to the exhibit, which shows the output o! the BGP database.

FCSS_NST_SE-7.6 Question 18

Which two statements are correct? (Choose two.)

Options:

A.

The advertised prefix of 10.20.30.0/24 was configured using the network command.

B.

The first four prefixes are being advertised using a legacy route advertisement.

C.

The advertised prefix of 10.20.30.0/24 is being advertised through the redistribution of another routing protocol.

D.

The output shows all prefixes advertised by all neighbors as well as the local router.

Buy Now
Questions 19

An administrator wants to capture encrypted phase 2 traffic between two FotiGate devices using the built-in sniffer.

If the administrator knows that there Is no NAT device located between both FortiGate devices, which command should the administrator run?

Options:

A.

diagnose sniffer packet any ' udp port 500 '

B.

diagnose sniffer packet any ' lp proto 50 '

C.

diagnose sniffer packet any ' udp port 4500 '

D.

diagnose sniffer packet any ' ah '

Buy Now
Questions 20

Refer to the exhibit, which shows a truncated output of a real-time LDAP debug.

FCSS_NST_SE-7.6 Question 20

What two conclusions can you draw from the output? (Choose two.)

Options:

A.

The name of the configured LDAP server is Lab.

B.

The user is authenticating using CN=John Smith.

C.

FortiOS is able to locate the user in step 3 (Bind Request) of the LDAP authentication process.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

Buy Now
Questions 21

Exhibit.

FCSS_NST_SE-7.6 Question 21

Refer to the exhibit, which shows the output of a diagnose command.

What can you conclude about the debug output in this scenario?

Options:

A.

The first server provided to FortiGate when it performed a DNS query looking for a list of rating servers, was 121.111.236.179.

B.

There is a natural correlation between the value in the FortiGuard-requests field and the value in the Weight field.

C.

FortiGate used 64.26.151.37 as the initial server to validate its contract.

D.

Servers with a negative TZ value are less preferred for rating requests.

Buy Now
Questions 22

Refer to the exhibit.

FCSS_NST_SE-7.6 Question 22

The exhibit shows the output of a session. Which two statements are correct? (Choose two.)

Options:

A.

The session did not match a firewall policy.

B.

The gateway to the destination is 10.1.10.1.

C.

The session was initiated from an authenticated user.

D.

The TCP session has been successfully established.

Buy Now
Questions 23

Refer to the exhibit.

FCSS_NST_SE-7.6 Question 23

The modified output of live routing kemel is shown

Which two statements about the output are (rue? (Choose two.)

Options:

A.

The BGP route to 10.0.4.0/24 is not in the forwarding information base.

B.

The default static route through 10.200.1 254 is in the forwarding information base.

C.

FortiGate is performing ECMP using both default static routes.

D.

The local FortiGate is receiving only one LSA from one OSPF neighbor.

Buy Now
Questions 24

Refer to the exhibit, which shows a partial output of a real-time LDAP debug.

FCSS_NST_SE-7.6 Question 24

What two conclusions can you draw from the output? (Choose two.)

Options:

A.

The user was found in the LDAP tree, whose root is TAC.ottawa.fortinet.com.

B.

FortiOS performs a bind to the LDAP server using the user ' s credentials.

C.

FortiOS collects the user group information.

D.

FortiOS is performing the second step (Search Request) in the LDAP authentication process.

Buy Now
Questions 25

Which two statements are true regarding heartbeat messages sent from an FSSO collector agent to FortiGate? (Choose two.)

Options:

A.

The heartbeat messages can be seen using the command diagnose debug authd fsso list.

B.

The heartbeat messages can be seen in the collector agent logs.

C.

The heartbeat messages can be seen on FortiGate using the real-lime FSSO debug.

D.

The heartbeat messages must be manually enabled on FortiGate.

Buy Now
Questions 26

Refer to the exhibits, which contain the partial configurations of two VPNs on FortiGate.

FCSS_NST_SE-7.6 Question 26

An administrator has configured two VPNs for two different user groups. Users who are in the Users-2 group are not able to connect to the VPN. After running a diagnostics command, the administrator discovers that FortiGate is not matching the user-2 VPN for members of the Users-2 group.

Which two changes must the administrator make to fix the issue? (Choose two.)

Options:

A.

Change to aggressive mode on both VPNs.

B.

Enable XAuth on both VPNs.

C.

Use different pre-shared keys on both VPNs.

D.

Set up specific peer IDs on both VPNs.

Buy Now
Questions 27

Refer to the exhibit, which shows partial outputs from two routing debug commands.

FCSS_NST_SE-7.6 Question 27

Which change must an administrator make on FortiGate to route web traffic from internal users to the internet, using ECMP?

Options:

A.

Set snat-route-change to enable.

B.

Set the priority of the static default route using port2 to 1.

C.

Set preserve-session-route to enable.

D.

Set the priority of the static default route using port1 to 10.

Buy Now
Questions 28

What is the correct order of the IKEv2 request-and-response protocol?

Options:

A.

Create_Child_SA, IKEAUTH, IKESAJNIT

B.

Create_Child_SA, IKE_SA_INIT. IKE_AUTH

C.

IKE SA INIT, IKE AUTH. Create Child SA OIKE AUTH.

D.

IKE_AUTH_IKE_SA_INIT, Create_Child_SA

Buy Now
Questions 29

Refer to the exhibit, which shows a truncated output of a real-time RADIUS debug.

FCSS_NST_SE-7.6 Question 29

Which two statements are true? (Choose two answers)

Options:

A.

The RADIUS server queried for authentication is located at IP address 172.25.188.164.

B.

Authentication was unsuccessful.

C.

The authentication scheme used was pop3.

D.

Authentication was successful.

E.

Two-factor authentication was required.

Buy Now
Questions 30

What are two functions of automation stitches? (Choose two.)

Options:

A.

You can configure automation stitches to run diagnostic commands and attach the results to an email message when CPU or memory usage exceeds specified thresholds.

B.

You can configure automation stitches to modify packet headers and payloads if specific traffic triggers an anomaly IPS event.

C.

You can configure automation stitches to insert a delay between actions if the automation stitches are set to execute actions in parallel.

D.

You can configure automation stitches to take parameters from previous actions as input for the next action if the automation stitches are set to execute actions in sequence.

Buy Now
Questions 31

Refer to the exhibit.

FCSS_NST_SE-7.6 Question 31

The sniffer log on two FortiGate devices are shown. Based on the information in the log, which two factors explain the output on FortiGate FGT-02? (Choose two answers)

Options:

A.

A third-party device is blocking protocol 50.

B.

The administrator has not yet configured the VPN tunnel on FGT-02.

C.

The administrator configured the wrong remote peer IP address on FGT-01.

D.

The administrator set the wrong sniffer filter on FGT-02.

Buy Now
Questions 32

Refer to the exhibit, which shows the output of a diagnose command.

FCSS_NST_SE-7.6 Question 32

What two conclusions can you draw from the output shown in the exhibit? (Choose two answers)

Options:

A.

This is an expected session created by the IPS engine.

B.

Traffic in the original direction (coming from the IP address 10.171.121.38) will be routed to the next-hop IP address 10.0.1.10.

C.

Traffic in the original direction (coming from the IP address 10.171.121.38) will be routed to the next-hop IP address 10.200.1.1.

D.

This is a pinhole session created to allow traffic for a protocol that requires additional sessions to operate through FortiGate.

Buy Now
Questions 33

Refer to the exhibits.

FCSS_NST_SE-7.6 Question 33

An administrator is attempting to advertise the network configured on port3. However, FGT-A is not receiving the prefix.

Which two actions can the administrator take to fix this problem? (Choose two.)

Options:

A.

Modify the prefix using the network command from 172.16.0.0/16 to 172.16.54.0/24.

B.

Manually add the BGP route on FGT-A.

C.

Restart BGP using a soft reset to force both peers to exchange their complete BGP routing tables.

D.

Use the set network-import-check disable command.

Buy Now
Questions 34

Refer to the exhibit.

FCSS_NST_SE-7.6 Question 34

The output from using the command diagnose debug application samld -1 to diagnose a SAML connection is shown. Based on this output, which two conclusions can you draw? (Choose two answers)

Options:

A.

The IdP IP address is 10.1.10.254.

B.

The SP IP address is 10.1.10.254.

C.

The SP IP address is 10.1.10.2.

D.

The IdP IP address is 10.1.10.2.

Buy Now
Questions 35

What are two functions of automation stitches? (Choose two.)

Options:

A.

You can configure automation stitches on any FortiGate device in a Security Fabric environment.

B.

You can configure automation stitches to execute actions sequentially by taking parameters from previous actions as input for the current action.

C.

You can set an automation stitch configured to execute actions in parallel to insert a specific delay between actions.

D.

You can create automation stitches to run diagnostic commands and attach the results to an email message when CPU or memory usage exceeds specified thresholds.

Buy Now
Questions 36

Exhibit.

FCSS_NST_SE-7.6 Question 36

Refer to the exhibit, which contains a screenshot of some phase 1 settings.

The VPN is not up. To diagnose the issue, the administrator enters the following CLI commands on an SSH session on FortiGate:

FCSS_NST_SE-7.6 Question 36

However, the IKE real-time debug does not show any output. Why?

Options:

A.

The administrator must also run the command diagnose debug enable.

B.

The debug shows only error messages. If there is no output, then the phase 1 and phase 2 configurations match.

C.

The log-filter setting is incorrect. The VPN traffic does not match this filter.

D.

Replace diagnose debug application ike -1 with diagnose debug application ipsec -1.

Buy Now
Questions 37

Which statement about parallel path processing is correct (PPP)?

Options:

A.

PPP chooses from a group of parallel options lo identity the optimal path tor processing a packet.

B.

Only FortiGate hardware configurations affect the path that a packet takes.

C.

PPP does not apply to packets that are part of an already established session.

D.

Software configuration has no impact on PPP.

Buy Now
Questions 38

Which three common FortiGate-to-collector-agent connectivity issues can you identify using the FSSO real-time debug? (Choose three.)

Options:

A.

The SSL certificate used for FSSO over SSL has expired.

B.

The connection was refused. There may be a mismatch of the TCP port.

C.

FortiGate cannot reach the IP address of the collector agent.

D.

The pro-shared key does not match

E.

The group filters do not match.

Buy Now
Questions 39

Refer to the exhibit.

FCSS_NST_SE-7.6 Question 39

A network topology and a partial routing table are shown.

FortiGate has already been configured with a firewall policy that allows all ICMP traffic to flow from port1 to port3.

Which two changes can the administrator perform to ensure the server at 10.4.0.1/24 receives the ICMP echo reply from the laptop at 10.1.0.1/24? (Choose two.)

Options:

A.

Enable asymmetric routing under config system settings.

B.

Change the FortiGate configuration from strict RPF check mode to feasible RPF check mode.

C.

Modify the default gateway on the laptop from 10.1.0.2 to 10.1.0.254.

D.

Add a default static route on FortiGate to forward all traffic to port3.

Buy Now
Exam Code: FCSS_NST_SE-7.6
Exam Name: Fortinet NSE 6 - Network Security 7.6 Support Engineer
Last Update: Apr 11, 2026
Questions: 131

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now FCSS_NST_SE-7.6 testing engine

PDF (Q&A)

$31.5  $104.99
buy now FCSS_NST_SE-7.6 pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 11 Apr 2026