Download FCSS-Enterprise Firewall 7.4 Administrator.FCSS_EFW_AD-7.4.Actual4Test.2026-05-20.122q.tqb

Vendor: Fortinet
Exam Code: FCSS_EFW_AD-7.4
Exam Name: FCSS-Enterprise Firewall 7.4 Administrator
Date: May 20, 2026
File Size: 27 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
Refer to the exhibit, which shows partial outputs from two routing debug commands.
Which change must an administrator make on FortiGate to route web traffic from internal users to the internet, using ECMP?
  1. Set preserve-session-route to enable.
  2. Set the priority of the static default route using port2 to 1.
  3. Set snat-route-change to enable.
  4. Set the priority of the static default route using port1 to 10.
Correct answer: D
Question 2
Refer to the exhibit, which shows a partial enterprise network.
An administrator would like the area 0.0.0.0 to detect the external network.
What must the administrator configure?
  1. Enable RIP redistribution on FortiGate B.
  2. Configure a distribute-route-map-in on FortiGate B.
  3. Configure a virtual link between FortiGate A and B.
  4. Set the area 0.0.0.l type to stub on FortiGate A and B.
Correct answer: A
Explanation:
The diagram shows amulti-area OSPF networkwhere:#FortiGate Ais inOSPF Area 0 (Backbone area).#FortiGate Bis inOSPF Area 0.0.0.1and is connected to anRIP network.To ensure thatOSPF Area 0 (0.0.0.0) learns routes from the external RIP network, FortiGate B must redistribute RIP routes into OSPF.Steps to achieve this:1.Enable route redistribution on FortiGate Bto inject RIP-learned routes into OSPF.2. This allows OSPFArea 0.0.0.1to forward RIP routes toOSPF Area 0 (0.0.0.0), making the external network visible.
The diagram shows amulti-area OSPF networkwhere:
#FortiGate Ais inOSPF Area 0 (Backbone area).
#FortiGate Bis inOSPF Area 0.0.0.1and is connected to anRIP network.
To ensure thatOSPF Area 0 (0.0.0.0) learns routes from the external RIP network, FortiGate B must redistribute RIP routes into OSPF.
Steps to achieve this:
1.Enable route redistribution on FortiGate Bto inject RIP-learned routes into OSPF.
2. This allows OSPFArea 0.0.0.1to forward RIP routes toOSPF Area 0 (0.0.0.0), making the external network visible.
Question 3
An administrator wants to simplify a new hub-and-spoke network deployment with the BGP recommended configuration.
Which two sections on FortiManager must the administrator use? (Choose two.)
  1. Meta Fields
  2. Metadata Variables
  3. Provisioning Templates
  4. Automation Stitch
Correct answer: B, C
Question 4
Refer to the exhibit, which contains the partial output of a diagnose command.
Based on the output, which two statements are correct? (Choose two.)
  1. The remote gateway IP is 10.200.5.1.
  2. Anti-replay is enabled.
  3. The remote gateway has quick mode selectors containing a destination subnet of 10.1.2.0/24.
  4. DPD is disabled.
Correct answer: B, C
Question 5
An administrator wants to scale the IBGP sessions and optimize the routing table in an IBGP network.
Which parameter should the administrator configure?
  1. network-import-check
  2. ibgp-enforce-multihop
  3. neighbor-group
  4. route-reflector-client
Correct answer: D
Explanation:
In an IBGP (Internal BGP) network, all routers must be fully meshed, meaning every router must establish a BGP session with every other router in the same autonomous system (AS). This does not scale well in large networks due to the exponential increase in BGP sessions.To optimize and scale IBGP, Route Reflectors (RRs) are used. A Route Reflector (RR) reduces the number of IBGP peer connections by allowing a centralized router (RR) to redistribute IBGP routes to other IBGP peers (called clients). This eliminates the need for a full mesh, significantly reducing BGP session overhead.By configuring the route-reflector-client setting on IBGP peers, an administrator can:Scale IBGP sessions by reducing the number of direct BGP peer connections. Optimize the routing table by ensuring routes are efficiently propagated within the IBGP network. Eliminate the need for full mesh topology, making IBGP more manageable.
In an IBGP (Internal BGP) network, all routers must be fully meshed, meaning every router must establish a BGP session with every other router in the same autonomous system (AS). This does not scale well in large networks due to the exponential increase in BGP sessions.
To optimize and scale IBGP, Route Reflectors (RRs) are used. A Route Reflector (RR) reduces the number of IBGP peer connections by allowing a centralized router (RR) to redistribute IBGP routes to other IBGP peers (called clients). This eliminates the need for a full mesh, significantly reducing BGP session overhead.
By configuring the route-reflector-client setting on IBGP peers, an administrator can:
Scale IBGP sessions by reducing the number of direct BGP peer connections. Optimize the routing table by ensuring routes are efficiently propagated within the IBGP network. Eliminate the need for full mesh topology, making IBGP more manageable.
Question 6
Examine the output of the 'diagnose ips anomaly list' command shown in the exhibit; then answer the question below.
Which IP addresses are included in the output of this command?
  1. Those whose traffic matches an IPS sensor.
  2. Those whose traffic exceeded a threshold of a matching DoS policy.
  3. Those whose traffic was detected as an anomaly by an IPS sensor.
  4. Those whose traffic matches a DoS policy.
Correct answer: B
Question 7
An administrator wants to capture ESP traffic between two FortiGates using the built-in sniffer. If the administrator knows that there is no NAT device located between both FortiGates, What command should the administrator execute?
  1. diagnose sniffer packet any 'udp port 4500'
  2. diagnose sniffer packet any 'esp'
  3. diagnose sniffer packet any 'udp port 500 or udp port 4500'
  4. diagnose sniffer packet any 'udp port 500'
Correct answer: B
Question 8
Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering?
(Choose two.)
  1. FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard.
  2. The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard.
  3. The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model.
  4. The ISDB limits access by URL and domain.
Correct answer: A, B
Explanation:
The Internet Service Database (ISDB) in FortiGate is used to enforce content filtering at Layer 3 (Network Layer) and Layer 4 (Transport Layer) of the OSI model by identifying applications based on their predefined IP addresses and ports.FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard:FortiGate retrieves and updates a predefined list of IPs and ports for different internet services from FortiGuard.This allows FortiGate to block specific services at Layer 3 and Layer 4 without requiring deep packet inspection.The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard:ISDB works by matching traffic to known IP addresses and ports of categorized services. When an application or service is blocked, FortiGate prevents communication by denying traffic based on its destination IP and port number.
The Internet Service Database (ISDB) in FortiGate is used to enforce content filtering at Layer 3 (Network Layer) and Layer 4 (Transport Layer) of the OSI model by identifying applications based on their predefined IP addresses and ports.
FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard:
FortiGate retrieves and updates a predefined list of IPs and ports for different internet services from FortiGuard.
This allows FortiGate to block specific services at Layer 3 and Layer 4 without requiring deep packet inspection.
The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard:
ISDB works by matching traffic to known IP addresses and ports of categorized services. When an application or service is blocked, FortiGate prevents communication by denying traffic based on its destination IP and port number.
Question 9
Refer to the exhibit, which shows a physical topology and a traffic log.
The administrator is checking on FortiAnalyzer traffic from the device with IP address10.1.10.1, located behind the FortiGate ISFW device.
The firewall policy in on the ISFW device does not have UTM enabled and the administrator is surprised to see a log with the actionMalware, as shown in the exhibit.
What are the two reasons FortiAnalyzer would display this log? (Choose two.)
  1. Security rating is enabled in ISFW.
  2. ISFW is in a Security Fabric environment.
  3. ISFW is not connected to FortiAnalyzer and must go through NGFW-1.
  4. The firewall policy in NGFW-1 has UTM enabled.
Correct answer: B, D
Explanation:
From the exhibit, ISFW is part of a Security Fabric environment with NGFW-1 as the Fabric Root. In this architecture, FortiGate devices share security intelligence, including logs and detected threats.ISFW is in a Security Fabric environment:# Security Fabric allows devices like ISFW toreceive threat intelligencefrom NGFW-1, even if UTM is not enabled locally.# If NGFW-1 detects malware fromIP 10.1.10.1 to 89.238.73.97, this information can bepropagated to ISFW and FortiAnalyzer.The firewall policy in NGFW-1 has UTM enabled:# Even thoughISFW does not have UTM enabled, NGFW-1 (which sits between ISFW and the external network)does have UTM enabledand is scanning traffic.# Since NGFW-1 detects malware in the session, it logs the event, which is then sent toFortiAnalyzer.
From the exhibit, ISFW is part of a Security Fabric environment with NGFW-1 as the Fabric Root. In this architecture, FortiGate devices share security intelligence, including logs and detected threats.
ISFW is in a Security Fabric environment:
# Security Fabric allows devices like ISFW toreceive threat intelligencefrom NGFW-1, even if UTM is not enabled locally.
# If NGFW-1 detects malware fromIP 10.1.10.1 to 89.238.73.97, this information can bepropagated to ISFW and FortiAnalyzer.
The firewall policy in NGFW-1 has UTM enabled:
# Even thoughISFW does not have UTM enabled, NGFW-1 (which sits between ISFW and the external network)does have UTM enabledand is scanning traffic.
# Since NGFW-1 detects malware in the session, it logs the event, which is then sent toFortiAnalyzer.
Question 10
Which statements about bulk configuration changes using FortiManager CLI scripts are correct?
(Choose two.)
  1. When executed on the Remote FortiGate directly, administrators do not have the option to review the changes prior to installation.
  2. When executed on the Device Database, you must use the installation wizard to apply the changes to the managed FortiGate.
  3. When executed on the Policy Package, ADOM database, changes are applied directly to the managed FortiGate.
  4. When executed on the All FortiGate in ADOM, changes are automatically installed without creating a new revision history.
Correct answer: A, B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!