Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

FCSS_SDW_AR-7.6 FCSS - SD-WAN 7.6 Architect Questions and Answers

Questions 4

Refer to the exhibit.

FCSS_SDW_AR-7.6 Question 4

The exhibit shows the BGP configuration on the hub in a hub-and-spoke topology. The administrator wants BGP to advertise prefixes from spokes to other spokes over the IPsec overlays, including additional paths. However, when looking at the spoke routing table, the administrator does not see the prefixes from other spokes and the additional paths

Which three settings must the administrator configure inside each BGP neighbor group so spokes can learn the prefixes of other spokes and their additional paths? (Choose three.)

Options:

A.

Set additional-path to send

B.

Set additional-path to forward

C.

Enable route-reflector-server

D.

Enable route-reflector-client.

E.

Set adv-additional-path to the number of additional paths to advertise.

Buy Now
Questions 5

Refer to the exhibits.

FCSS_SDW_AR-7.6 Question 5

You use FortiManager to configure SD-WAN on three branch devices.

When you install the device settings. FortiManager prompts you with the error "Copy Failed" for the device branch1_fat When you click the log button. FortiManager displays the message shown in the exhibit.

Options:

A.

Based on the exhibits, which statement best describes the issue and how you can resolve it?

B.

Remove the installation target for the SD-WAN member port4. You cannot combine metadata variable and installation targets.

C.

Gateways for all members in a zone must be defined the same way. Specify the gateway of the SD-WAN member port! without metadata variables.

D.

Check the metadata variable definitions, and review the per-device mapping configuration.

E.

Check the connection between branch1_fgt and FortiManager

Buy Now
Questions 6

Refer to the exhibits.

FCSS_SDW_AR-7.6 Question 6

The exhibits show the configuration for SD-WAN performance. SD-WAN rule, the application IDs of Facebook and YouTube along with the firewall policy configuration and the underlay zone status.

Which two statements are true about the health and performance of SD-WAN members 3 and 4? (Choose two.)

Options:

A.

Only related TCP traffic is used for performance measurement.

B.

The performance is an average of the metrics measured for Facebook and YouTube traffic passing through the member.

C.

Encrypted traffic is not used for the performance measurement.

D.

FortiGate identifies the member as dead when there is no Facebook and YouTube traffic passing through the member.

Buy Now
Questions 7

Refer to the exhibit that shows a diagnose output on FortiGate.

FCSS_SDW_AR-7.6 Question 7

Based on the output shown in the exhibit, what can you say about the device role and how it handles health checks?

Options:

A.

The device is a spoke. It receives health-check measures for the tunnels of another spoke.

B.

The device is a hub. It receives embedded health-check measures for each tunnel from the spoke.

C.

The device is a spoke. It provides embedded health-check measures for each tunnel to the hub.

D.

The device is a hub. It receives health-check measures for the tunnels of a spoke.

Buy Now
Questions 8

Refer to the exhibits.

FCSS_SDW_AR-7.6 Question 8

The exhibits show two IPsec templates to define Branch IPsec 1 and Branch_IPsec_2. Each template defines a VPN tunnel. The error message that FortiManager displayed when the administrator tried to assign the second template to the FortiGate device is also shown.

Which statement best describes the cause of the issue?

Options:

A.

You can assign only one template with a tunnel type of static to each FortiGate device.

B.

You can assign only one IPsec template to each FortiGate device.

C.

You should review the branch1_fgt configuration for configured tunnels in the rootVDOM.

D.

You should use the same outgoing interface of both templates.

Buy Now
Questions 9

(Which two features must you configure before FortiGate can steer traffic according to SD-WAN rules? Choose two answers.)

Options:

A.

Security profiles

B.

Underlay links

C.

Overlay links

D.

Traffic shaping

E.

Firewall policies

Buy Now
Questions 10

You used the HUB IPsec_Recommended and the BRANCH IPsec_Recommended templates to define the overlay topology. Then, you used the SD-WAN template to define the SD- WAN members, rules, and performance SLAs.

You applied the changes to the devices and want to use the FortiManager monitors menu to get a graphical view that shows the status of each SD-WAN member.

Which statement best explains how to obtain this graphical view?

Options:

A.

Use the SD-WAN monitor template view to get a map view of the branches, hub, and tunnel status, including the SLA pass or missed status.

B.

Use the SD-WAN monitor table view to get a donut view and a table view that shows the status of each SD-WAN member, including the SLA pass or missed status.

C.

Use the VPN monitor map view to get a map view of the branches, hub, and tunnel status, including the SLA pass or missed status.

D.

Use the SD-WAN monitor asset view to get a donut view and a table view that shows the status of each device and the SLA status of each SD-WAN member.

Buy Now
Questions 11

Which three factors about SLA targets and SD-WAN rules should you consider when configuring SD-WAN rules? (Choose three.)

Options:

A.

Member metrics are measured only if a rule uses the SLA target.

B.

SLA targets are used only by SD-WAN rules that are configured with a Lowest Cost (SLA) strategy.

C.

SD-WAN rules can use SLA targets to check whether the preferred members meet the SLA requirements.

D.

When configuring an SD-WAN rule, you can select multiple SLA targets if they are from the same performance SLA.

E.

When configuring an SD-WAN rule, you can select multiple SLA targets from different performance SLAs.

Buy Now
Questions 12

Refer to the exhibit.

FCSS_SDW_AR-7.6 Question 12

The administrator configured the SD-WAN rule ID 4 with two members (port1 and port2) and strategy lowest cost (SLA).

What are the two characteristics of the session shown in the exhibit? (Choose two.)

Options:

A.

FortiGate steered this flow according to an SD-WAN rule 4.

B.

FortiGate will never re-evaluate this session.

C.

FortiGate steered this flow according to the application detected and the outgoing interface is port3.

D.

FortiGate will re-evaluate this session if the outgoing interface goes down.

Buy Now
Questions 13

(Refer to the exhibit.

FCSS_SDW_AR-7.6 Question 13

What can you conclude from the output shown? Choose one answer.)

Options:

A.

It is a spoke device. SD-WAN rule 3 is configured with nine members.

B.

It is a spoke device. The members of SD-WAN rule 3 are grouped into two zones.

C.

It is a hub device. It allowed the establishment of three auto-discovery VPN (ADVPN) shortcuts.

D.

It is a spoke device. SD-WAN rule 4 allows three shortcut tunnels.

Buy Now
Questions 14

Which two statements correctly describe what happens when traffic matches the implicit SD-WAN rule? (Choose two.)

Options:

A.

The session information output displays no SD-WAN service id.

B.

Traffic is load balanced using the algorithm set for the v4-ecmp-mode setting.

C.

The traffic is distributed, regardless of weight, through all available static routes.

D.

Traffic does not match any of the entries in the policy route table.

E.

FortiGate flags the session with may_dirty and vwl_def ault.

Buy Now
Questions 15

You have a FortiGate configuration with three user-defined SD-WAN zones and two members in each of these zones. One SD-WAN member is no longer in use in health-check and SD-WAN rules. You want to delete it.

What happens if you delete the SD-WAN member from the FortiGate GUI?

Options:

A.

FodiGate accepts the deletion and removes routes as required.

B.

FortiGate displays an error message. You must use the CLI to delete an SD-WAN member.

C.

FortiGate displays an error message. SD-WAN zones must contain at least two members

D.

FortiGate accepts the deletion and places the member in the default SD-WAN zone.

Buy Now
Questions 16

(Refer to the exhibit.

FCSS_SDW_AR-7.6 Question 16

The event log on a FortiGate device is shown.

Based on the output shown in the exhibit, what can you conclude about the tunnels on this device? (Choose one answer))

Options:

A.

There is one shortcut tunnel built from the master tunnel VPN4.

B.

The voice traffic is steered through the VPN tunnel HUB1-VPN3.

C.

The VPN tunnel HUB1-VPN1_0 is a shortcut tunnel.

D.

The master tunnel HUB2-VPN3 cannot accept Auto-Discovery VPN (ADVPN) shortcuts.

Buy Now
Questions 17

(In which order does FortiGate consider the following elements during the route lookup process? Choose one answer.)

Options:

A.

SD-WAN rules, ISDB routes, policy routes, BGP routes

B.

Policy routes, SD-WAN rules, Internet Service Database (ISDB) routes, BGP routes

C.

SD-WAN rules, policy routes, static routes, ISDB routes

D.

Policy routes, ISDB routes, SD-WAN rules, static routes

Buy Now
Questions 18

(Refer to the exhibits.

FCSS_SDW_AR-7.6 Question 18

The SD-WAN zones and members configuration of two branch devices are shown. The two branch devices are part of the same hub-and-spoke topology and connect to the same hub. The devices are configured to allow Auto-Discovery VPN (ADVPN). The configuration on the hub allows the initial communication between the two spokes.

When traffic flows require it, between which interfaces can the devices establish shortcuts? Choose one answer.)

Options:

A.

Any interface in the overlay zones

B.

Interface connected to HUB only

C.

Between T3 on Branch-A and TC on Branch-B

D.

Between T2 on Branch-A and TA on Branch-B

Buy Now
Questions 19

An SD-WAN member is no longer used to steer SD-WAN traffic. The administrator updated the SD-WAN configuration and deleted the unused member. After the configuration update, users report that some destinations are unreachable. You confirm that the affected flow does not match an SD-WAN rule.

What could be a possible cause of the traffic interruption?

Options:

A.

FortiGate, with SD-WAN enabled, cannot route traffic through interfaces that are not SD-WAN members.

B.

FortiGate can remove some static routes associated with an interface when the member is removed from SD-WAN.

C.

FortiGate removes the layer 3 settings for interfaces that are removed from the SD-WAN configuration.

D.

FortiGate administratively brings down interfaces when they are removed from the SD-WAN configuration.

Buy Now
Questions 20

Refer to the exhibit.

FCSS_SDW_AR-7.6 Question 20

The exhibit shows the details of a session and the index numbers of some relevant interfaces on a FortiGate device that supports hardware offloading.

Based on the information shown in the exhibits, which two conclusions can you draw? (Choose two.)

Options:

A.

By default, FortiGate offloads symmetric and asymmetric flows.

B.

The original direction of the symmetric traffic flows from port3 to port2.

C.

The reply direction of the asymmetric traffic flows from port2 to port3.

D.

The auxiliary session can be offloaded to hardware.

Buy Now
Questions 21

Refer to the exhibits, which show the configuration of an SD-WAN rule and the corresponding rule status and routing table.

FCSS_SDW_AR-7.6 Question 21

FCSS_SDW_AR-7.6 Question 21

The administrator wants to understand the expected behavior for traffic matching the SD-WAN rule.

Based on the exhibits, what can the administrator expect for traffic matching the SD-WAN rule?

Options:

A.

The traffic will be routed over HUB1-VPN3.

B.

The traffic will be routed over HUB1-VPN2

C.

The traffic will be routed over HUB1-VPN1.

D.

The traffic will be load balanced across all three overlays

Buy Now
Questions 22

(Refer to the exhibit.

FCSS_SDW_AR-7.6 Question 22

Based on the output shown in the exhibit, what can you conclude about the device role and how it handles health checks? Choose one answer.)

Options:

A.

The device is a spoke and it provides embedded health-check measures for each tunnel to the hub.

B.

The device is a spoke and it receives health-check measures for the tunnels of another spoke.

C.

The device is a hub and it receives embedded health-check measures for each tunnel from the spoke.

D.

The device is a hub and it receives health-check measures for the tunnels of a spoke.

Buy Now
Questions 23

(As an IT manager, you want to delegate the installation and management of your SD-WAN deployment to a managed security service provider (MSSP). Each site must maintain direct internet access and be secure. You expect significant traffic flow between the sites and want to delegate as much of the network administration and management as possible to the MSSP.

Which two MSSP deployment blueprints address your requirements? Choose two answers.)

Options:

A.

Use a shared hub on the MSSP premises and a dedicated hub on the customer premises, and install the spokes on the customer premises.

B.

Install a dedicated hub on the MSSP premises for the customer, and install the spokes on the customer premises.

C.

Install the hub and spokes on the customer premises, and enable the MSSP to manage the SD-WAN deployment using FortiManager with a dedicated ADOM.

D.

Use a shared hub on the MSSP premises with a dedicated VDOM for the customer, and install the spokes on the customer premises.

Buy Now
Questions 24

(You are using the FortiManager SD-WAN monitor menus to check the status of an SD-WAN topology. When you place the mouse next to branch1_fgt, you receive the output shown in the exhibit.

FCSS_SDW_AR-7.6 Question 24

Which two conclusions can you draw from the output shown in the exhibit? Choose two answers.)

Options:

A.

Three spokes have tunnels that are out of SLA.

B.

The template Corp-SOT defines a dual-hub topology.

C.

branch3_fgt is configured with three SD-WAN overlay tunnels and one is down.

D.

branch1_fgt is configured with six SD-WAN overlay tunnels and three are down.

Buy Now
Questions 25

As an IT manager for a healthcare company, you want to delegate the installation and management of your SD-WAN deployment to a managed security service provider (MSSP). Each site must maintain direct internet access and ensure that it is secure. You expected significant traffic flow between the sites and want to delegate as much of the network administration and management as possible to the MSSP.

Which two MSSP deployment blueprints best address the customer’s requirements? (Choose two.)

Options:

A.

Use a shared hub at the MSSP premises with a dedicated VDOM for the new customer, and install the spokes at the customer premises.

B.

Use a shared hub at the MSSP premises and a dedicated hub at the customer premises and install the spokes at the customer premises.

C.

Install a dedicated hub at the MSSP premises for the new customer, and install the spokes at the customer premises.

D.

Install the hub and spokes at the customer premises and enable the MSSP to manage the SD-WAN deployment using FortiManager with a dedicated ADOM.

Buy Now
Questions 26

Refer to the exhibit.

FCSS_SDW_AR-7.6 Question 26

The exhibit shows the health-check configuration on a FortiGate device used as a spoke. You notice that the hub FortiGate doesn’t prioritize the traffic as expected.

Which two configuration elements should you check on the hub? (Choose two.)

Options:

A.

The performance SLA has the parameter priority-out-sla configured.

B.

This performance SLA uses the same members.

C.

The performance SLA uses the same criteria.

D.

The performance SLA is configured with set embedded-measure accept.

Buy Now
Questions 27

Refer to the exhibit.

FCSS_SDW_AR-7.6 Question 27

The administrator used the SD-WAN overlay template to prepare an IPsec tunnels configuration for a hub-and-spoke SD-WAN topology. The exhibit shows the FortiManager installation preview for one FortiGate device.

Based on the exhibit, which statement best describes the configuration applied to the FortiGate device?

Options:

A.

It is a spoke device that establishes dynamic IPsec tunnels to the hub. The local subnet range is 10.10.128.0/23.

B.

It is a hub device. It can send ADVPN shortcut offers.

C.

It is a hub device. It will automatically discover the spoke devices and add them to the SD-WAN topology.

D.

It is a spoke device that establishes dynamic IPsec tunnels to the hub It can send ADVPN shortcut requests.

Buy Now
Questions 28

Refer to the exhibit.

FCSS_SDW_AR-7.6 Question 28

You configure SD-WAN on a standalone FortiGate device. You want to create an SD-WAN rule that steers Facebook and Linkedin traffic through the less costly internet link. The FortiGate GUI page appears as shown in the exhibit.

What should you do to set Facebook and LinkedIn as destinations?

Options:

A.

Install a license to allow applications as destinations of SD-WAN rules.

B.

In the Internet service field, select Facebook and LinkedIn.

C.

Enable the applications as destinations of the SD-WAN rule feature visibility.

D.

You cannot configure applications as destinations of an SD-WAN rule on a standalone FortiGate device.

Buy Now
Exam Code: FCSS_SDW_AR-7.6
Exam Name: FCSS - SD-WAN 7.6 Architect
Last Update: Feb 25, 2026
Questions: 94

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99