Try 12 Fortinet Certified Fundamentals (FCF) in Cybersecurity sample questions and practice-test preview prompts on threat concepts, security controls, network basics, cloud security, identity, and responsible escalation.
Fortinet Certified Fundamentals (FCF) in Cybersecurity is a foundations route for candidates building security vocabulary, risk awareness, and first-pass operational judgment before moving into more specialized Fortinet certification paths.
Use this page to preview the kind of cybersecurity reasoning an FCF practice route should test. The questions below are original IT Mastery sample questions, not official Fortinet exam questions.
Topic: phishing
A user receives an email that appears to be from IT support and asks them to enter their password on an unfamiliar site. What is the best first action?
Best answer: B
Explanation: A suspected credential-harvesting message should be reported through the approved channel so security staff can preserve evidence, block similar messages, and warn affected users.
Topic: availability
Which situation most directly affects the availability part of the CIA triad?
Best answer: D
Explanation: Availability means systems and data are accessible when needed. Outages, denial-of-service events, and failed dependencies are availability concerns.
Topic: least privilege
An intern needs read-only access to one documentation folder for two weeks. Which access choice best follows least privilege?
Best answer: A
Explanation: Least privilege gives only the access needed, for only as long as needed, with enough review evidence to remove or adjust the access later.
Topic: multi-factor authentication
Why does multi-factor authentication reduce account-takeover risk?
Best answer: C
Explanation: Multi-factor authentication adds a second proof, such as a device, app prompt, hardware key, or biometric factor. It does not eliminate every attack, but it reduces the impact of a stolen password.
Topic: segmentation
A guest Wi-Fi network should not reach internal finance systems. Which control idea is most relevant?
Best answer: B
Explanation: Network segmentation separates traffic zones and reduces blast radius. Guest access should be isolated from sensitive business systems.
Topic: cloud responsibility
In a cloud service, the provider secures part of the platform, but the customer still controls user access and some configuration. What model does this describe?
Best answer: D
Explanation: Cloud security commonly follows a shared-responsibility model. The exact split depends on the service type, but customers usually retain responsibility for identity, data, and configuration choices.
Topic: incident response
A workstation displays ransomware notes and suspicious file extensions. What should the user do first?
Best answer: A
Explanation: Ransomware response should preserve evidence, limit spread, and alert the right responders. Payment, log deletion, or random restarts can make recovery harder.
Topic: logging
Why are security logs useful?
Best answer: C
Explanation: Logs support visibility. They help teams understand what happened, when it happened, and which systems or users were involved.
Topic: malware prevention
Which approach is strongest for reducing malware risk?
Best answer: B
Explanation: Malware defense is layered. No single tool is enough; prevention, detection, recovery, and user behavior all matter.
Topic: VPNs
What is the main security purpose of a VPN for remote access?
Best answer: D
Explanation: A VPN can protect remote traffic and connect users to authorized resources. It still needs authentication, endpoint controls, and access policy.
Topic: data classification
Why should an organization classify data?
Best answer: A
Explanation: Classification helps teams decide which controls fit the sensitivity and business impact of data. Public marketing content and confidential client data should not be handled the same way.
Topic: vulnerability and exploit
Which statement best distinguishes a vulnerability from an exploit?
Best answer: C
Explanation: A vulnerability is the weakness. An exploit is how an attacker or test tool uses that weakness to produce impact.
| Area | What to check |
|---|---|
| Threats | Can you identify phishing, malware, credential theft, and denial-of-service patterns? |
| Controls | Can you map basic controls to identity, endpoint, network, cloud, and data risks? |
| Response | Can you choose escalation steps that preserve evidence and reduce spread? |
| Judgment | Can you explain why a control fits the scenario rather than only naming an acronym? |