Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

NSE7_CDS_AR-7.6 Sample Questions Answers

Questions 4

Your monitoring team reports performance issues with a web application hosted in Azure. You suspect that the bottleneck might be due to unexpected inbound traffic spikes.

Which method should you use to identify and analyze the traffic pattern?

Options:

A.

Deploy Azure Firewall to log traffic by IP address.

B.

Enable Azure DDoS protection to prevent inbound traffic spikes.

C.

Use Azure Traffic Manager to visualize all traffic to the application.

D.

Enable NSG Flow Logs and analyze logs with Azure Monitor.

Buy Now
Questions 5

You are experiencing intermittent connectivity issues in a FortiGate HA cluster deployed with Azure gateway load balancer. Traffic is being dropped when it passes through the cluster. What is the cause of the issue? (Choose one answer)1

Options:

A.

The FortiGate firewalls are using the default maximum transmission unit (M2TU) size supported by Azure.

B.

The Azure gateway load balancer is configured with an incorrect health probe port.

C.

The Azure gateway load balancer is blocking large packets, causing traffic failures.

D.

The protected VMs are running an application that fragments packets.

Buy Now
Questions 6

Refer to the exhibit.

You deployed a FortiGate HA active-passive cluster in Microsoft Azure.

Which two statements regarding this particular deployment are true? (Choose two.)

Options:

A.

You can use the vdom-exception command to synchronize the configuration.

B.

During a failover, all existing sessions are transferred to the new active FortiGate.

C.

The configuration does not synchronize between the primary and secondary devices.

D.

There is no SLA for API calls from Microsoft Azure.

Buy Now
Questions 7

Refer to the exhibit.

The exhibit shows a customer deployment of two Linux instances and their main routing table in Amazon Web Services (AWS). The customer also created a Transit Gateway (TGW) and two attachments. Which two steps are required to route traffic from Linux instances to the TGW? (Choose two answers)

Options:

A.

In the main subnet routing table in VPC A and B, add a new route with destination 0.0.0.0/0, next hop TGW.12

B.

In the TGW route table, associate two attachments.34

C.

In the TGW route table, add route propagation to 192.168.0.0/16.56

D.

In the main subnet routing table in VPC A and B, add a new route with7 destination 0.0.0.0/0, next hop Internet 8gateway (IGW).

Buy Now
Questions 8

Refer to the exhibit.

An administrator installed a FortiWeb ingress controller to protect a containerized web application. What is the reason for the status shown in FortiView? (Choose one answer)

Options:

A.

The SDN connector is not authenticated correctly.

B.

The FortiWeb VM is missing a route to the node subnet.

C.

The manifest file deployed is configured with the wrong node IP addresses.

D.

The load balancing type is not set to round-robin.

Buy Now
Questions 9

Refer to the exhibit.

What is the purpose of this section of an Azure Bicep file?

Options:

A.

To restrict which FortiOS versions are accepted for deployment

B.

To indicate the correct FortiOS upgrade path after deployment

C.

To add a comment with the permitted FortiOS versions that can be deployed

D.

To document the FortiOS versions in the resulting topology

Buy Now
Questions 10

You are using Ansible to modify the configuration of several FortiGate VMs. What is the minimum number of files you need to create, and in which file should you configure the target FortiGate IP addresses?

Options:

A.

One playbook file for each target and the required tasks, and one inventory file.

B.

One .yaml file with the targets IP addresses, and one playbook file with the tasks.

C.

One inventory file for each target device, and one playbook file.

D.

One text file for all target devices, and one playbook file.

Buy Now
Questions 11

Refer to the exhibit.

After analyzing the native monitoring tools available in Azure, an administrator decides to use the tool displayed in the exhibit.

Why would an administrator choose this tool?

Options:

A.

To view details about Azure resources and their relationships across multiple regions.

B.

To obtain, and later examine, traffic flow data with a visualization tool.

C.

To help debug issues affecting virtual network gateways.

D.

To compare the latency of an on-premises site with the latency of an Azure application.

Buy Now
Questions 12

A customer would like to use FortiGate fabric integration with FortiCNP. When adding a FortiGate VM to FortiCNP, which three mandatory configuration steps must you follow on FortiGate? (Choose three answers)

Options:

A.

Enable pre-shared key on both sides.

B.

Import the FortiGate certificate into FortiCNP.

C.

Configure FortiGate to send logs to FortiCNP.

D.

Create an IPS sensor and a firewall policy.

E.

Create an SSL/SSH inspection profile.

Buy Now
Questions 13

Refer to the exhibit.

An administrator used the what-if tool to preview the changes to an Azure Bicep file. What will happen if the administrator applies these changes in Azure? (Choose one answer)

Options:

A.

A new subnet will be added to vnet-002.

B.

The vnet-002 VNet will be renamed Production.

C.

The resulting VNet will have a single subnet.

D.

The VNet address space will be updated.

Buy Now
Questions 14

You are investigating an attack path for a top risky host. You notice that the Common Vulnerability Scoring System (CVSS) and the vulnerability impact scores are very high. However, the attack path severity for the top risky host itself is low. Which two pieces of contextualized information can help you understand why? (Choose two answers)

Options:

A.

The FortiCNAPP risk score

B.

The package status

C.

The vulnerability score

D.

The fix version

Buy Now
Questions 15

You must add an Amazon Web Services (AWS) network access list (NACL) rule to allow SSH traffic to a subnet for temporary testing purposes. When you review the current inbound and outbound NACL rules, you notice that the rules with number 5 deny SSH and telnet traffic to the subnet.

What can you do to allow SSH traffic?

Options:

A.

You do not have to create any NACL rules because the default security group rule automatically allows SSH traffic to the subnet.

B.

You must create a new allow SSH rule anywhere in the network ACL rule base to allow SSH traffic.

C.

You must create two new allow SSH rules, each with a number bigger than 5.

D.

You must create two new allow SSH rules, each with a number smaller than 5.

Buy Now
Questions 16

What are two main features in Amazon Web Services (AWS) network access control lists (NACLs)? (Choose two answers)

Options:

A.

NACLs are stateless, and inbound and outbound rules are used for traffic filtering.

B.

NACLs are tied to an instance.

C.

The default NACL is configured to allow all traffic.

D.

You cannot use NACLs and Security Groups at the same time.

Buy Now
Exam Code: NSE7_CDS_AR-7.6
Exam Name: Fortinet NSE 7 - Public Cloud Security 7.6.4 Architect
Last Update: Feb 12, 2026
Questions: 54
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now NSE7_CDS_AR-7.6