Try 12 Fortinet Certified Associate (FCA) in Cybersecurity sample questions and practice-test preview prompts on security operations, network defense, endpoint awareness, cloud risk, identity, and platform-fit decisions.
Fortinet Certified Associate (FCA) in Cybersecurity is a practical associate route for candidates who need security-operations awareness, defensive-control reasoning, and enough platform vocabulary to choose the right next Fortinet path.
Use this page to preview the kind of operational judgment an FCA practice route should test. The questions below are original IT Mastery sample questions, not official Fortinet exam questions.
Topic: alert triage
A SOC alert shows repeated failed logins followed by a successful login from a new country. What is the best next step?
Best answer: C
Explanation: The pattern suggests possible credential attack activity. The analyst should preserve evidence, validate the event, and escalate according to policy rather than ignoring or overreacting.
Topic: endpoint defense
An endpoint is missing critical patches and has disabled protection services. Which action best reduces immediate risk?
Best answer: A
Explanation: Missing patches and disabled controls increase compromise risk. The response should restore protective controls and patching while following approved operational procedures.
Topic: identity
A contractor needs temporary access to one internal tool. Which access pattern is strongest?
Best answer: D
Explanation: Temporary access still needs accountability, least privilege, strong authentication, and lifecycle control.
Topic: cloud risk
A storage bucket contains sensitive exports and is accidentally made public. What is the primary concern?
Best answer: B
Explanation: Public exposure of sensitive data is a confidentiality risk. The team should remove unintended access, assess exposure, and correct the configuration and monitoring process.
Topic: platform fit
A team wants to reduce malicious web access, inspect network traffic, and enforce policy between zones. Which control area is most relevant?
Best answer: C
Explanation: Firewall policy and security profiles can enforce network access and inspect traffic. Physical badges and password policy do not directly control web and inter-zone traffic.
Topic: email security
What is a realistic goal of email-security controls?
Best answer: A
Explanation: Email controls reduce risk from common delivery channels, but they do not remove the need for awareness, monitoring, and response.
Topic: alert tuning
An alert fires hundreds of times per day for expected system behavior, and analysts stop reviewing it. What should be done?
Best answer: D
Explanation: Noisy alerts reduce trust. Tuning should preserve meaningful detection while reducing false positives and documenting the rationale.
Topic: remote access
Remote employees need access to an internal administrative portal. Which design is safest?
Best answer: B
Explanation: Remote access should be authenticated, authorized, monitored, and constrained to required resources.
Topic: network access control
An unmanaged device appears on a corporate network segment. What should a defensive control do?
Best answer: C
Explanation: Network access decisions should consider device identity, posture, and policy. Unknown or noncompliant devices should not receive unrestricted access.
Topic: ransomware recovery
Which preparation best improves ransomware recovery?
Best answer: A
Explanation: Recovery depends on backups that are protected from the attacker, tested, and supported by documented procedures.
Topic: security awareness
Which awareness message is most useful for reducing social-engineering risk?
Best answer: D
Explanation: Effective awareness helps users act early and safely. Reporting culture matters because users often see phishing, impersonation, and fraud attempts first.
Topic: change control
A firewall rule is added during an incident and never reviewed. What is the best follow-up?
Best answer: B
Explanation: Emergency changes should be reviewed after the event. Temporary access can become long-term exposure if ownership and expiration are not checked.
| Area | What to check |
|---|---|
| Triage | Can you separate urgent indicators from normal operational noise? |
| Controls | Can you choose the right control family for email, endpoint, identity, cloud, or network risk? |
| Operations | Can you preserve evidence and escalate without overcorrecting? |
| Governance | Can you identify when access, alerts, or firewall changes need review? |