Questions for the FCSS CDS AR 7 6 were updated on : Nov 23 ,2025
What is the main advantage of using SD-WAN Transit Gateway Connect over traditional SD-WAN?
D
Refer to the exhibit.
A senior administrator in a multinational organization needs to include a comment in the template
shown in the exhibit to ensure that administrators from other regions change the Amazon Machine
Image (AMI) ID to one that is valid in their location.
How can the administrator add the required comment in that section of the file?
C
Refer to the exhibit.
Refer to the exhibit.
In your Amazon Web Services (AWS), you must allow inbound HTTPS access to the Customer VPC
FortiGate VM from the internet. However, your HTTPS connection to the FortiGate VM in the
Customer VPC is not successful.
Also, you must ensure that the Customer VPC FortiGate VM sends all the outbound internet traffic
through the Security VPC.
How do you correct this issue with minimal configuration changes? (Choose three.)
B, C, E
Refer to the exhibit.
Refer to the exhibit.
You have deployed a Linux EC2 instance in Amazon Web Services (AWS) with the settings shown in
the exhibit.
What next step must the administrator take to access this instance from the internet?
A
You have deployed a FortiGate HA cluster in Azure using a Gateway Load Balancer for traffic
inspection. However, traffic is not being routed correctly through the firewalls.
What can be the cause of the issue?
B
An administrator is relying on an Azure Bicep linter to find possible issues in Bicep files.
Which problem can the administrator expect to find?
B
You need a solution to safeguard public cloud-hosted web applications from the OWASP Top 10
vulnerabilities. The solution must support the same region in which your applications reside, with
minimum traffic cost.
Which solution meets the requirements?
C
Refer to the exhibit.
Refer to the exhibit.
An experienced AWS administrator is creating a new Virtual Private Cloud (VPC) flow log with the
settings shown in the exhibit.
What is the purpose of this configuration?
C
The cloud administration team is reviewing an AWS deployment that was done using
CloudFormation.
The deployment includes six FortiGate instances that required custom configuration changes after
being deployed. The team notices that unwanted traffic is reaching some of the FortiGate instances
because the template is missing a security group.
To resolve this issue, the team decides to update the JSON template with the missing security group
and then apply the updated template directly, without using a change set.
What is the result of following this approach?
B
Your monitoring team reports performance issues with a web application hosted in Azure. You
suspect that the bottleneck might be due to unexpected inbound traffic spikes.
Which method should you use to identify and analyze the traffic pattern?
D
Refer to the exhibit.
In which type of FortiCNP insights can an administrator examine the findings triggered by this policy?
B
An administrator is trying to implement FortiCNP with Microsoft Azure Security integration.
However, FortiCNP is not able to extract any cloud integration data from Azure; therefore, real-time
cloud security monitoring is not possible.
What is causing this issue?
D
Refer to the exhibit.
Refer to the exhibit.
You attempted to access the Linux1 EC2 instance directly from the internet using its public IP address
in AWS. However, your connection is not successful.
Given the network topology, what can be the issue?
B
Refer to the exhibit.
Refer to the exhibit.
You deployed an HA active-active load balance sandwich with two FortiGate VMs in Microsoft Azure.
After the deployment, you prefer to use FGSP to synchronize sessions and allow asymmetric return
traffic. In the environment, FortiGate port 1 and port 2 are facing external and internal load balancers
respectively.
What IP address must you use in the peering configuration?
D
Which statement about Transit Gateway (TGW) in Amazon Web Services (AWS) is true?
B