Fortinet NSE 7 - Public Cloud Security 7.6.4 Architect NSE7_CDS_AR-7.6 Exam Questions

Page: 1 / 14
Total 54 questions
Question 1

An administrator is looking for a solution that can provide insight into users and data stored in major SaaS applications in the multicloud environment. Which product should the administrator deploy to have secure access to SaaS applications? (Choose one answer)



Answer : B

Comprehensive and Detailed Explanation From FortiOS 7.6, FortiWeb 7.4 Exact Extract study guide:

Based on the Fortinet Cloud Security 7.4 documentation and the FortiCASB Administration Guide, secur5ing a multi6cloud environment requires specialized tools for Software-as-a-Service (SaaS) visibility:

SaaS Visibility and Protection (Option B): FortiCASB (Cloud Access Security Broker) is a cloud-native service designed specifically to provide insight into users and data stored within major SaaS applications like Office 365, Google Drive, and Salesforce.

Key Capabilities:

Data Discovery: It allows administrators to scan and identify sensitive data (PII, PCI, etc.) stored within SaaS platforms to prevent data leakage.

User Behavior Monitoring: It tracks user activities and alerts on anomalous behavior, such as logins from suspicious locations or excessive file downloads, to ensure secure access.

Threat Protection: It integrates with FortiGuard to scan files within the cloud for malware, providing a layer of security that traditional network firewalls cannot reach once the data is inside the SaaS provider's infrastructure.

Why other options are incorrect:

Option A: FortiSandbox is used for advanced threat detection by executing suspicious files in a safe environment; it does not provide user/data management for SaaS applications.

Option C: FortiWeb is a Web Application Firewall (WAF) designed to protect web applications and APIs hosted on-premises or in the cloud from attacks like SQL injection; it is not a SaaS security broker.

Option D: FortiSIEM is a security information and event management solution used for cross-infrastructure logging and correlation; while it can ingest logs from SaaS, it does not provide the native data-level insights or direct access controls that FortiCASB offers.


Question 2

An administrator decides to use the Use managed identity option on the FortiGate SDN connector with Microsoft Azure. However, the SDN connector is failing on the connection.

What must the administrator do to correct this issue?



Answer : C


Question 3

You have deployed a FortiGate HA cluster in Azure using a gateway load balancer for traffic inspection. However, traffic is not being routed correctly through the firewalls.

What can be the cause of the issue?



Answer : A

According to the FortiOS 7.6 Azure Administration Guide and the Cloud Security 7.4 Public Cloud Study Guide, the integration of FortiGate-VMs with an Azure Gateway Load Balancer (GWLB) requires specific network configurations to ensure packet transit:

IP Forwarding Requirement (Option A): By default, Azure Network Interfaces (NICs) drop any traffic that does not originate from or is not destined for the IP address assigned to that NIC. For a FortiGate to act as a 'bump-in-the-wire' or transparent inspector, it must receive traffic destined for other IPs and forward it. This requires the IP Forwarding setting to be explicitly enabled on the FortiGate's network interfaces within the Azure portal. If this is disabled, the Azure fabric will discard the traffic being steered through the FortiGate HA cluster by the GWLB.

VXLAN Encapsulation: The Azure GWLB uses VXLAN to encapsulate traffic (adding a VXLAN header with a specific VNI) before sending it to the FortiGate. The FortiGate must terminate this VXLAN tunnel. While the VXLAN configuration is crucial, the underlying infrastructure check for IP Forwarding is the most common cause of traffic being blocked at the NIC level before the FortiOS stack can process the packet.

Why other options are incorrect:

Option B: If health probes fail, the GWLB will typically stop sending traffic to that specific instance. While this affects the HA cluster's availability, the question states traffic is not being routed correctly through the firewalls (implying an active flow issue), and the primary mechanism for allowing a VM to process third-party traffic in Azure is IP Forwarding.

Option C: NSGs are typically applied to the NIC or Subnet. While incorrect NSG rules can block traffic, 'IP Forwarding' is a specific requirement for the FortiGate to function as a network appliance (NVA) regardless of the NSG state.

Option D: Azure GWLB supports cross-subscription and cross-tenant chaining. The consumer (protected VMs) and the provider (FortiGate HA cluster) do not need to be in the same subscription, provided the GWLB endpoint is correctly mapped.


Question 4

Refer to the exhibit.

After the initial Terraform configuration in Microsoft Azure, the terraform plan command is run.

Which two statements about running the terraform plan command are true? (Choose two.)



Answer : C, D


Question 5

You have onboarded the organization's Microsoft Azure account on FortiCNAPP using the automated configuration approach. However, FortiCNAPP does not appear to be receiving any workload scanning data. How can you remedy this? (Choose one answer)



Answer : D

Comprehensive and Detailed Explanation From FortiOS 7.6, FortiWeb 7.4 Exact Extract study guide:

Based on the FortiCNAPP 24.x Administration Guide regarding Microsoft Azure onboarding and feature activation:

Separation of Integration Types (Option D): In FortiCNAPP, onboarding a cloud account via the automated configuration approach often initializes the Cloud Security Posture Management (CSPM) and Cloud Infrastructure Entitlement Management (CIEM) features. However, Workload Scanning (specifically Agentless Scanning) is treated as a distinct integration type within the platform.

Guided Configuration Requirement: Even after the account is onboarded, the administrator must navigate to the Integrations or Onboarding section and specifically add the Workload Scanning integration for that Azure account. This 'Guided Configuration' ensures that the necessary additional permissions (such as those required to create snapshots of disks and scan them) and resources (like the scanner VNet or regional scanners) are properly deployed within the Azure environment.

Why other options are incorrect:

Option A & B: Automated onboarding already handles the creation of necessary App Registrations and Service Principals. Manually adding more without following the specific integration workflow will not activate the workload scanning engine.

Option C: Threat policies are used to generate alerts based on existing data. If the raw workload scanning data is not being received from Azure, a policy will have no data to analyze; the issue is at the ingestion/integration layer, not the policy layer.


Question 6

Refer to the exhibit.

A FortiCNAPP administrator used the FortiCNAPP Explorer to reveal all hosts exposed to the internet that are running active packages with vulnerabilities of all severity levels. Why do only the first two results have an attack path? (Choose one answer)



Answer : A

Comprehensive and Detailed Explanation From FortiOS 7.6, FortiWeb 7.4 Exact Extract study guide:

Based on the FortiCNAPP (formerly Lacework) Cloud Security documentation regarding Attack Path Analysis and Explorer functionality:

Attack Path Generation (Option A): In FortiCNAPP, an 'Attack Path' is a visualized sequence of potential exploit steps that an external attacker could take to reach a sensitive resource. For the platform to generate and display an attack path, the target resource must be externally reachable.

Evidence in the Exhibit: * The exhibit shows a list of EC2 and GCP instances.

The first two results (Resource IDs i-0d2d... and i-0e29...) have values populated in the Public IP Addresses column (44.197.... and 3.226....). Consequently, these are the only two resources showing a value of 1 in the Attack Paths column.

The remaining resources in the list do not have public IP addresses listed in the exhibit's view, and as a result, their Attack Paths count is 0. This confirms that FortiCNAPP specifically calculates these paths for resources that have a direct entry point from the internet via a public IP.

Contextual Risk Assessment: FortiCNAPP prioritizes attack path analysis for internet-exposed assets because they represent the highest immediate risk. While internal resources may have vulnerabilities, the lack of a public-facing network interface means there is no direct external 'path' to visualize in this specific Explorer view.


Question 7

Refer to the exhibit.

Which FortiCNP policy type generated the finding shown in the exhibit? (Choose one answer)



Answer : B

Comprehensive and Detailed Explanation From FortiOS 7.6, FortiWeb 7.4 Exact Extract study guide:

Based on the FortiCNP 22.4/24.4 Administration Guide and the Fortinet Cloud Security Study Guide, findings in FortiCNP are categorized by the specific policy type that triggered the alert.

Threat Detection Policy (Option B): This policy category is designed to monitor and alert on anomalous User Activity and Network threats. Specifically, 'Suspicious Location' is a predefined threat detection rule that triggers when a user performs an action (such as a Download File as seen in the exhibit) from a geographic location or IP address that is not on the organization's allow list or deviates from established behavioral baselines. The exhibit explicitly shows the 'Activity Type' as 'Download File' and the 'Policy Name' as 'Suspicious Location,' both of which fall under the Threat Detection > User Activity policy tab.

Policy Hierarchy and Finding Types:

Threat Detection: Includes User Activity (Suspicious Location, Suspicious Time, Suspicious Movement) and Network findings.

Data Scan Policy (Option A): These policies are used for content-level inspection, such as searching for Malware or Data Loss Prevention (DLP) patterns like credit card numbers within files.

Risk Management Policy (Option C): These policies focus on Cloud Security Posture Management (CSPM), alerting on misconfigurations such as unencrypted buckets or disabled logging (e.g., CloudTrail).

File Collection (Option D): While 'File Collection' is a configuration object used to define a group of files for monitoring, it is not the policy type that generates a behavioral alert like 'Suspicious Location'.


Page:    1 / 14   
Total 54 questions