Questions for the FCP FGT AD 7 6 were updated on : Nov 23 ,2025
Which three pieces of information does FortiGate use to identify the hostname of the SSL server
when SSL certificate inspection is enabled? (Choose three.)
B, C, D
Explanation:
When SSL certificate inspection is enabled on a FortiGate device, the system uses the following three
pieces of information to identify the hostname of the SSL server:
Server Name Indication (SNI) extension in the client hello message (B): The SNI is an extension in the
client hello message of the SSL/TLS protocol. It indicates the hostname the client is attempting to
connect to. This allows FortiGate to identify the server's hostname during the SSL handshake.
Subject Alternative Name (SAN) field in the server certificate (C): The SAN field in the server
certificate lists additional hostnames or IP addresses that the certificate is valid for. FortiGate
inspects this field to confirm the identity of the server.
Subject field in the server certificate (D): The Subject field contains the primary hostname or domain
name for which the certificate was issued. FortiGate uses this information to match and validate the
server’s identity during SSL certificate inspection.
The other options are not used in SSL certificate inspection for hostname identification:
Host field in the HTTP header (A): This is part of the HTTP request, not the SSL handshake, and is not
used for SSL certificate inspection.
Serial number in the server certificate (E): The serial number is used for certificate management and
revocation, not for hostname identification.
Reference
FortiOS 7.4.1 Administration Guide -
SSL/SSH Inspection
, page 1802.
FortiOS 7.4.1 Administration Guide -
Configuring SSL/SSH Inspection Profile
, page 1799.
Refer to the exhibit.
Which two statements are true about the routing entries in this database table? (Choose two.)
C, D
Explanation:
The routing table in the exhibit shows two default routes (0.0.0.0/0) with different administrative
distances:
The default route through port2 has an administrative distance of 20.
The default route through port1 has an administrative distance of 10.
Administrative distance determines the priority of the route; a lower value is preferred. Here, the
route through port1 with an administrative distance of 10 is the preferred route. The route through
port2 with an administrative distance of 20 acts as a standby or backup route. If the primary route
(port1) fails or is unavailable, traffic will then be routed through port2.
Regarding the statement that the port2 interface is marked as inactive, there is no indication in the
routing table that port2 is inactive. Similarly, all the routes displayed are not necessarily installed in
the FortiGate routing table, as the table could include both active and backup routes.
Reference:
FortiOS 7.4.1 Administration Guide: Default route configuration
FortiOS 7.4.1 Administration Guide: Routing table explanation
Refer to the exhibit.
Refer to the exhibits.
An administrator configured the Web Filter Profile to block access to all social networking sites
except Facebook. However, when users try to access Facebook.com, they are redirected to a
FortiGuard web filtering block page.
Based on the exhibits, which configuration change must the administrator make to allow Facebook
while blocking all other social networking sites?
B
You are encountering connectivity problems caused by intermediate devices blocking IPsec traffic.
In which two ways can you effectively resolve the problem? (Choose two.)
B, D
Refer to the exhibit.
Refer to the exhibits.
You have implemented the application sensor and the corresponding firewall policy as shown in the
exhibits.
Which two factors can you observe from these configurations? (Choose two.)
B, D
Refer to the exhibit.
The exhibit shows the FortiGuard Category Based Filter section of a corporate web filter profile.
An administrator must block access to download.com, which belongs to the Freeware and Software
Downloads category. The administrator must also allow other websites in the same category.
What are two solutions for satisfying the requirement? (Choose two.)
A, C
Explanation:
Creating a static URL filter to block download.com specifically allows blocking that site without
affecting the entire category.
Using a separate firewall policy with a Deny action for an FQDN address object matching
download.com can also block the site while allowing others in the same category.
Refer to the exhibits.
An administrator wants to add HQ-ISFW-2 in the Security Fabric. HQ-ISFW-2 is in the same subnet as
HQ-ISFW. After configuring the Security Fabric settings on HQ-ISFW-2, the status stays Pending.
What can be the two possible reasons? (Choose two.)
A, C
Explanation:
The Upstream FortiGate IP should match the IP address of the Fabric Root interface, which is
10.0.11.254, not 10.0.13.254.
The new device (HQ-ISFW-2) must be authorized on the Fabric Root (HQ-ISFW) before it can join the
Security Fabric, otherwise the status remains pending.
Refer to the exhibits.
Based on the current HA status, an administrator updates the override and priority parameters on
HQ-NGFW-1 and HQ-NGFW-2 as shown in the exhibit.
What would be the expected outcome in the HA cluster?
B
Explanation:
With override enabled on HQ-NGFW-2 and its higher priority (110 vs. 90), HQ-NGFW-2 will become
the primary device, preempting HQ-NGFW-1 despite the current primary status.
Refer to the exhibits.
The exhibits show the system performance output and default configuration of high memory usage
thresholds on a FortiGate device.
Based on the system performance output, what are the two possible outcomes? (Choose two.)
C, D
Explanation:
Since memory usage is at 90%, exceeding the red threshold (88%), FortiGate enters a state where
configuration changes are still allowed.
In this state, FortiGate drops new sessions to preserve resources and maintain stability.
Refer to the exhibits.
The exhibits show a diagram of a FortiGate device connected to the network, and the firewall
configuration.
An administrator created a Deny policy with default settings to deny Webserver access for Remote-
User2.
The policy should work such that Remote-User1 must be able to access the Webserver while
preventing Remote-User2 from accessing the Webserver.
Which additional configuration can the administrator add to a deny firewall policy, beyond the
default behavior, to block Remote-User2 from accessing the Webserver?
C
Explanation:
To block Remote-User2's access to the Webserver, the deny policy must explicitly specify the
Webserver as the destination address; otherwise, it denies traffic to all destinations, which is not the
desired behavior.
Refer to the exhibits.
The exhibits show a diagram of a FortiGate device connected to the network, as well as the IP pool
configuration and firewall policy objects.
The WAN (port2) interface has the IP address 100.65.0.101/24.
The LAN (port4) interface has the IP address 10.0.11.254/24.
Which IP address will be used to source NAT (SNAT) the traffic, if the user on
HQ-PC-1 (10.0.11.50) pings the IP address of BR-FGT (100.65.1.111)
C
Explanation:
The ping traffic policy uses the IP pool named SNAT-Remote1, which has the external IP range
100.65.0.99. Therefore, traffic matching this policy (ping from HQ-PC-1 to BR1-FGT) will use
100.65.0.99 for source NAT.
What are three key routing principles in SD-WAN? (Choose three.)
A, B, E
Explanation:
SD-WAN rules are skipped if none of the SD-WAN members have a valid route to the destination.
SD-WAN rules take precedence over other route types.
SD-WAN rules are skipped if the best route to the destination is not an SD-WAN member by default.
You have configured the FortiGate device for FSSO. A user is successful in log-in to windows, but their
access to the internet is denied.
What should the administrator check first?
C
Explanation:
Checking the active users list verifies if FortiGate correctly associates the user with their IP address,
ensuring proper policy enforcement for internet access.
Which statement correctly describes NetAPI polling mode for the FSSO collector agent?
B
Explanation:
NetAPI polling mode involves frequent queries to domain controllers, which can cause increased
bandwidth usage, especially in large networks with many login events.
Refer to the exhibits.
An administrator has observed the performance status outputs on an HA cluster for 55 seconds.
Which FortiGate is the primary?
D
Explanation:
The HA configuration shows that override is disabled (set override disable), but despite this, HQ-
NGFW-1 has the higher priority (200) and is acting as the primary, as indicated by its higher resource
usage and uptime. Override allows the device with higher priority to take over as primary, so HQ-
NGFW-1 is the primary device.