Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 3
Total 28 questions
Exam Code: FCSS_SDW_AR-7.6                Update: Feb 4, 2026
Exam Name: FCSS - SD-WAN 7.6 Architect

Fortinet FCSS - SD-WAN 7.6 Architect FCSS_SDW_AR-7.6 Exam Dumps: Updated Questions & Answers (February 2026)

Question # 1

Refer to the exhibit.

Which SD-WAN rule and interface uses FortiGate to steer the traffic from the LAN subnet 10.0.1.0/24 to the corporate server 10.2.5.254?

A.

SD-WAN service rule 3 and interface HUB1-VPN2.

B.

SD-WAN service rule 3 and interface HUB1-VPN3.

C.

SD-WAN service rule 4 and port1 or port2.

D.

SD-WAN service rule 4 and interface port2.

Question # 2

(Refer to the exhibits.

The SD-WAN zones and members configuration of two branch devices are shown. The two branch devices are part of the same hub-and-spoke topology and connect to the same hub. The devices are configured to allow Auto-Discovery VPN (ADVPN). The configuration on the hub allows the initial communication between the two spokes.

When traffic flows require it, between which interfaces can the devices establish shortcuts? Choose one answer.)

A.

Any interface in the overlay zones

B.

Interface connected to HUB only

C.

Between T3 on Branch-A and TC on Branch-B

D.

Between T2 on Branch-A and TA on Branch-B

Question # 3

(In which order does FortiGate consider the following elements during the route lookup process? Choose one answer.)

A.

SD-WAN rules, ISDB routes, policy routes, BGP routes

B.

Policy routes, SD-WAN rules, Internet Service Database (ISDB) routes, BGP routes

C.

SD-WAN rules, policy routes, static routes, ISDB routes

D.

Policy routes, ISDB routes, SD-WAN rules, static routes

Question # 4

Refer to the exhibit.

Which two conclusions can you draw from the output shown? (Choose two.)

A.

One SD-WAN rule is defined with application categories as the destination.

B.

UDP traffic destined to the subnet 10.22.0.0/24 matches a manual SD-WAN rule.

C.

One SD-WAN rule allows traffic load balancing.

D.

UDP traffic destined to the subnet 10.22.0.0/24 matches a policy route.

Question # 5

Refer to the exhibits, which show the configuration of an SD-WAN rule and the corresponding rule status and routing table.

The administrator wants to understand the expected behavior for traffic matching the SD-WAN rule.

Based on the exhibits, what can the administrator expect for traffic matching the SD-WAN rule?

A.

The traffic will be routed over HUB1-VPN3.

B.

The traffic will be routed over HUB1-VPN2

C.

The traffic will be routed over HUB1-VPN1.

D.

The traffic will be load balanced across all three overlays

Question # 6

(Refer to the exhibit.

Which statement correctly describes the role of the ADVPN device in handling traffic? Choose one answer.)

A.

This device is a spoke that has received a direct shortcut query from a remote spoke.

B.

This device is a hub, and two spokes, 192.2.0.1 and 10.0.3.101, established a shortcut.

C.

This device is a hub that has received a shortcut query from a spoke and has forwarded it to another spoke.

D.

This device is a spoke that has received a shortcut query from a remote hub.

Question # 7

Refer to the exhibits.

An administrator is testing application steering in SD-WAN. Before generating test traffic, the administrator collected the information shown in the first exhibit. After generating GoToMeeting test traffic, the administrator examined the corresponding traffic log on FortiAnalyzer, which is shown in the second exhibit.

The administrator noticed that the traffic matched the implicit SD-WAN rule, but they expected the traffic to match rule ID 1.

Which two reasons explain why some log messages show that the traffic matched the implicit SD-WAN rule? (Choose two.)

A.

Full SSL inspection is not enabled on the matching firewall policy.

B.

The session 3-tuple did not match any of the existing entries in the ISDB application cache.

C.

FortiGate could not refresh the routing information on the session after the application was detected.

D.

No configured SD-WAN rule matches the traffic related to the collaboration application GoToMeeting

Question # 8

Refer to the exhibit.

The exhibit shows the BGP configuration on the hub in a hub-and-spoke topology. The administrator wants BGP to advertise prefixes from spokes to other spokes over the IPsec overlays, including additional paths. However, when looking at the spoke routing table, the administrator does not see the prefixes from other spokes and the additional paths

Which three settings must the administrator configure inside each BGP neighbor group so spokes can learn the prefixes of other spokes and their additional paths? (Choose three.)

A.

Set additional-path to send

B.

Set additional-path to forward

C.

Enable route-reflector-server

D.

Enable route-reflector-client.

E.

Set adv-additional-path to the number of additional paths to advertise.

Question # 9

Refer to the exhibit.

The exhibit shows output of the command diagnose sys adwan aervice4 collected on a FortiGate device.

The administrator wants to know through which interface FortiGate will steer traffic from local users on subnet 10.0.1.0/255.255.255.192 and with a destination of the social media application Facebook.

Based on the exhibits, which two statements are correct? (Choose two.)

A.

When FortiGate cannot recognize the application of the flow, it steers the traffic through the preferred member of rule 3, HQ_T1.

B.

There is no service defined for the Facebook application, so FortiGate appliesservice rule 3 and directs the traffic to headquarters.

C.

FortiGate steers traffic for social media applications according to the service rule 2 and steers traffic through port2.

D.

When FortiGate cannot recognize the application of the flow, it load balances the traffic through the tunnels HQ_T1. HQ_T2. HQ_T3.

Question # 10

Which three characteristics apply to provisioning templates available on FortiManager? (Choose three.)

A.

A template group can include a system template and an SD-WAN template.

B.

Each template group can contain up to three IPsec tunnel templates.

C.

CLI templates are applied in order, from top to bottom

D.

A CLI template group can contain CLI templates of both types.

E.

A CLI template can be of type CLI script or Perl script.

Page: 1 / 3
Total 28 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 04 Feb 2026