View all questions & answers for the NSE 4 - FortiOS 7.6 Administrator Exam Materials exam


Question 15 Discussion

Which two statements describe characteristics of automation stitches? (Choose two answers)

  • A. Actions involve only devices included in the Security Fabric.
  • B. An automation stitch can have multiple triggers.
  • C. Multiple actions can run in parallel.
  • D. Triggers can involve external connectors.
Correct Answer: C,D

Brave-Dump Clients Votes

CD 66.67%
AC 16.67%
B 16.67%

Comments



Alex 2025-06-25 14:38:16

Selected Answers: A, C


Think there was a mistake on this one. There can only be a single trigger, and actions can run in parallel.


Mahboab Ali Ghaleb 2025-07-13 02:25:19

Selected Answers: C, D


A is false. Actions involve External System, Like send Emails. These actions don’t require the external system to be part of the Security Fabric topology. So, actions are not limited to devices in the Fabric.
D is correct. Triggers can come from external connectors, Like: FortiAnalyzer, FortiSIEM, FortiClient EMS, or external Fabric connectors (cloud platforms, external security tools, etc.).
External connectors can generate events that act as triggers for stitches.
  • Brave-Dumps Admin 2025-07-13 15:45:01
    Thanks, Mahboab!


Lucas Fetsch 2025-07-13 12:45:15

Selected Answers: C, D


https://docs.fortinet.com/document/fortigate/7.6.3/administration-guide/139441/automation-stitches
in addition to Mahboab even Devices which don´t have an Security Fabric can use Automation so A is wrong
  • Brave-Dumps Admin 2025-07-13 15:44:49
    Thanks, Lucas!


Brave-Dumps Admin 2025-07-13 15:49:31

Selected Answers: C, D


Thanks to our Brave-Dumps’ brilliant clients, Mahboab and Lucas for sharing experience in the Brave-Dumps community, answers changed on the website to C,D


Dizzle D 2025-12-12 09:32:01

Selected Answers: B


B is also correct, is it not? An automation stitch can have multiple triggers.
• Automation stitches in FortiGate can be configured with more than one trigger (e.g., event logs, threat detections, or external connectors). This allows flexible automation workflows.


Anonymous User 2026-01-12 16:22:53

Selected Answers: C, D


c d