Try 12 Fortinet Certified Professional (FCP) in Secure Networking sample questions and practice-test preview prompts on FortiGate, firewall policy, SD-WAN, VPN, security profiles, logging, and operational troubleshooting.
Fortinet Certified Professional (FCP) in Secure Networking is a professional route for candidates working with secure network design, FortiGate operations, firewall policy, VPNs, SD-WAN, inspection, logging, and troubleshooting.
Use this page to preview the kind of secure-networking decisions an FCP practice route should test. The questions below are original IT Mastery sample questions, not official Fortinet exam questions.
Topic: firewall policy
A business application needs access from one internal subnet to one partner IP address on a fixed service port. What policy is best?
Best answer: D
Explanation: Secure firewall policy should be as specific as practical and observable. A broad allow rule increases exposure and makes later troubleshooting harder.
Topic: security profiles
A rule permits outbound web traffic, but the organization still wants malware and malicious-site controls. What should be applied?
Best answer: B
Explanation: Allowing traffic does not remove inspection needs. Security profiles add prevention and detection controls to permitted flows.
Topic: SD-WAN
A branch has two WAN links. Voice traffic should use the lowest-latency healthy path, while file backups can use a cheaper path. What SD-WAN capability fits?
Best answer: C
Explanation: SD-WAN can steer traffic by application, health, SLA, and business priority. Different traffic classes can use different paths.
Topic: IPsec VPN
A site-to-site VPN is up, but only one subnet can reach the remote site. What should be checked first?
Best answer: A
Explanation: Partial VPN reachability commonly involves selectors, routing, policies, NAT behavior, or mismatched protected networks.
Topic: logging
Users report an application stopped working after a firewall change. Which evidence is most useful first?
Best answer: D
Explanation: Troubleshooting should start with evidence that shows how traffic is processed. Logs and recent changes can quickly narrow policy, routing, NAT, or inspection causes.
Topic: NAT
Internal private hosts need outbound internet access through a public address. Which NAT type is commonly involved?
Best answer: B
Explanation: Source NAT translates private source addresses to an address suitable for external routing. It is separate from policy and threat inspection.
Topic: high availability
Two firewall appliances are deployed for resilience. What must be tested before relying on the design?
Best answer: C
Explanation: High availability is only useful when failover behavior is understood and tested. Teams need evidence about convergence, sessions, monitoring, and recovery.
Topic: routing
Traffic is allowed by policy but never reaches the next hop. What should be checked?
Best answer: A
Explanation: Policy permits traffic, but routing determines where traffic goes. A correct firewall rule cannot compensate for a broken path.
Topic: web filtering
A company wants to reduce access to known malicious and newly registered domains. Which feature area is most relevant?
Best answer: D
Explanation: Web and DNS filtering can apply category and reputation-based decisions. It is a preventive control for risky destinations.
Topic: rule cleanup
A temporary vendor access rule remains active after the project ended. What should be done?
Best answer: B
Explanation: Rule hygiene prevents temporary exceptions from becoming permanent exposure. Ownership and recertification reduce accumulated risk.
Topic: TLS inspection
Before enabling deep TLS inspection broadly, what must be reviewed?
Best answer: C
Explanation: TLS inspection can improve visibility, but it has privacy, legal, trust, performance, and application-compatibility consequences. It must be governed and scoped carefully.
Topic: administration
Which administrative control improves accountability for firewall changes?
Best answer: A
Explanation: Named accounts and role-based access connect changes to accountable users. Shared accounts weaken investigation and governance.
| Area | What to check |
|---|---|
| Policy | Can you scope rules and explain why broad access is risky? |
| Path | Can you separate policy, routing, NAT, VPN, and SD-WAN causes? |
| Inspection | Can you decide where security profiles and TLS inspection belong? |
| Operations | Can you review HA, logging, admin access, and temporary-rule cleanup? |