New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

FCSS_LED_AR-7.6 Fortinet NSE 6 - LAN Edge 7.6 Architect Questions and Answers

Questions 4

Refer to the exhibits.

FCSS_LED_AR-7.6 Question 4

FCSS_LED_AR-7.6 Question 4

Examine the FortiGate RSSO configuration shown in the exhibit.

FortiGate is set up to use RSSO for user authentication. It is currently receiving RADIUS accounting messages through port3. The incoming RADIUS accounting messages contain the username in the User-Name attribute and group membership in the Class attribute. You must ensure that the users are authenticated through these RADIUS accounting messages and accurately mapped to their respective RSSO user groups.

Which three critical configurations must you implement on the FortiGate device? (Choose three.)

Options:

A.

The RADIUS Attribute Value setting configured for an RSSO user group should match the class RADIUS attribute value in the RADIUS accounting message.

B.

RSSO user groups should be assigned to all firewall policies.

C.

Device detection and Security Fabric Connection should be enabled on port3

D.

The sso-attribute CLI setting in the RSSO agent configuration should be set to Class.

E.

The rsso-endpoint-attribute CLI setting in the RSSO agent configuration should be set to User-Name.

Buy Now
Questions 5

Refer to the exhibit.

FCSS_LED_AR-7.6 Question 5

On FortiGate, a RADIUS server is configured to forward authentication requests to FortiAuthenticator, which acts as a RADIUS proxy. FortiAuthenticator then relays these authentication requests to a remote Windows AD server using LDAP.

While testing authentication using the CLI command diagnose test authserver. the administrator observed that authentication succeeded with PAP but failed when using MS-CHAFV2.

Which two solutions can the administrator implement to enable MS-CHAPv2 authentication? (Choose two.)

Options:

A.

Change the FortiGate authentication method to CHAP instead of MS-CHAPv2.

B.

Enable Windows Active Directory domain authentication on FortiAuthenticator.

C.

Enable RADIUS attribute filtering on FortiAuthenticator.

D.

Configure FortiAuthenticator to use RADIUS instead of LDAP as the back-end authentication server

Buy Now
Questions 6

You are troubleshooting a Syslog-based single sign-on (SSO) issue on FortiAuthenticator, where user authentication is not being correctly mapped from the syslog messages. You need a tool to diagnose the issue and understand the logs to resolve it quickly.

Which tool in FortiAuthenticator can you use to troubleshoot and diagnose a Syslog SSO issue?

Options:

A.

Debug logs > Remote Servers > Syslog Viewer

B.

Parsing Test Tool

C.

Debug logs > SSO Sessions page

D.

Debug logs > Single Sign-On > Syslog SSO

Buy Now
Questions 7

What is the expected behavior when enabling auto TX power control on a FortiAP interface?

Options:

A.

FortiGate monitors the signal strength of nearby AP interfaces and adjusts its own transmit power every 30 seconds to match the signal strength of the adjacent AP

B.

FortiGate measures the signal strength of nearby FortiAP interfaces every 30 seconds and adjusts their transmit power to ensure they remain detectable at -70 dBm.

C.

FortiGate periodically measures the signal strength of the weakest associated client and adjusts the AP radio power to align with the detected signal strength of that client.

D.

The AP periodically evaluates the signal strength of its own transmission from the client perspective and adjusts its power to ensure the signal is detected at -70 dBm.

Buy Now
Questions 8

Which FortiGuard licenses are required for FortiLink device detection to enable device identification and vulnerability detection?

Options:

A.

FortiGuard Vulnerability Management and FortiGuard Endpoit Protection

B.

FortiGuard Threat Intelligence and FortiGuard loT Detection

C.

FortiGuard Threat Intelligence and FortiGuard Endpoint Protection

D.

FortiGuard Attack Surface Security and FortiGuard loT Detection

Buy Now
Questions 9

You are deploying a FortiSwitch device managed by FortiGate in a secure network environment. To ensure accurate communication, you must identify which protocols are required for communication and control between FortiGate and FortiSwitch.

Which three protocols are used by FortiGate to manage and control FortiSwitch devices? (Choose three.)

Options:

A.

SNMP can be used by FortiGate to manage FortiSwitch devices by monitoring their status.

B.

UHTTPS is usea;by FortiGate to securely manage and configure FortiSwitch devices.

C.

FortiGate uses the Fortilink protocol to establish communication with FortiSwitch.

D.

CAPWAP is used to establish the control channel between FortiSwitch and FortiGate.

E.

IGMP is required for managing communication between FortiGate and FortiSwitch devices in multicast environments.

Buy Now
Questions 10

A FortiSwitch is not appearing in the FortiGate management interface after being connected via FortiLink. What could be a first troubleshooting step?

Options:

A.

Ensure that the FortiGate security policies allow traffic from the FortiSwitch.

B.

Manually assign a static IP to the FortiSwitch.

C.

Verify that FortiGate device DHCP server is assigning an IP to the FortiSwitch.

D.

Ensure the FortiSwitch has internet access.

Buy Now
Questions 11

A network administrator connects a new FortiGate to the network, allowing it to automatically discover andI register with FortiManager.

What occurs after FortiGate retrieves the FortiManager address?

Options:

A.

FortiGate establishes a secure tunnel to FortiManager over TCP port 541.

B.

The device needs to be manually authorized on FortiManager.

C.

FortiGate configures its interface settings based on a DHCP response from FortiManager.

D.

FortiGate sends a discovery request to all devices on the local network using UDP port 1068.

Buy Now
Questions 12

Refer to the exhibit.

FCSS_LED_AR-7.6 Question 12

FCSS_LED_AR-7.6 Question 12

FCSS_LED_AR-7.6 Question 12

Review the exhibits to analyze the network topology, SSID settings, and firewall policies.

FortiGate is configured to use an external captive portal for authentication to grant access to a wireless network. During testing, it was found that users attempting to connect to the SSID cannot access the captive portal login page.

What configuration change should be made to resolve this issue to allow users to access the captive portal?

Options:

A.

Change the SSID security mode to WPA2-Enterprise for authentication.

B.

Disable HTTPS redirection for the captive portal authentication page.

C.

Exclude FortiAuthenticator and Windows AD address objects from filtering.

D.

A firewall policy allowing Guest SSID traffic to reach FortiAuthenticator and Windows AD.

Buy Now
Exam Code: FCSS_LED_AR-7.6
Exam Name: Fortinet NSE 6 - LAN Edge 7.6 Architect
Last Update: Dec 14, 2025
Questions: 40

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99