Pre-Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

NSE8_812 Network Security Expert 8 Written Exam Questions and Answers

Questions 4

Refer to the CLI configuration of an SSL inspection profile from a FortiGate device configured to protect a web server:

NSE8_812 Question 4

Based on the information shown, what is the expected behavior when an HTTP/2 request comes in?

Options:

A.

FortiGate will reject all HTTP/2 ALPN headers.

B.

FortiGate will strip the ALPN header and forward the traffic.

C.

FortiGate will rewrite the ALPN header to request HTTP/1.

D.

FortiGate will forward the traffic without modifying the ALPN header.

Buy Now
Questions 5

Refer to the exhibit, which shows a VPN topology.

NSE8_812 Question 5

The device IP 10.1.100.40 downloads a file from the FTP server IP 192.168.4.50

Referring to the exhibit, what will be the traffic flow behavior if ADVPN is configured in this environment?

Options:

A.

All the session traffic will pass through the Hub

B.

The TCP port 21 must be allowed on the NAT Device2

C.

ADVPN is not supported when spokes are behind NAT

D.

Spoke1 will establish an ADVPN shortcut to Spoke2

Buy Now
Questions 6

Refer to the exhibit, which shows diagnostic output.

NSE8_812 Question 6

A customer reports that ICMP traffic flow from 192.168.1.11 to 93.190.134.171 is not corresponding to the SD-WAN setup.

What is the problem in this scenario?

Options:

A.

SD-WAN Rule is matching only DNS traffic.

B.

Port1 is used because it has more available bandwidth.

C.

Traffic is matched by policy route.

D.

Route for the destination IP is missing in the routing table.

Buy Now
Questions 7

Refer to the exhibits.

NSE8_812 Question 7

NSE8_812 Question 7

The exhibits show a FortiGate network topology and the output of the status of high availability on the FortiGate.

Given this information, which statement is correct?

Options:

A.

The ethertype values of the HA packets are 0x8890, 0x8891, and 0x8892

B.

The cluster mode can support a maximum of four (4) FortiGate VMs

C.

The cluster members are on the same network and the IP addresses were statically assigned.

D.

FGVMEVLQOG33WM3D and FGVMEVGCJNHFYI4A share a virtual MAC address.

Buy Now
Questions 8

Refer to the exhibit.

NSE8_812 Question 8

A customer wants to automate the creation and configuration of FortiGate VM instances in a VMware vCenter environment using Terraform. They have the creation part working with the code shown in the exhibit.

Which code snippet will allow Terraform to automatically connect to a newly deployed FortiGate if its IP was dynamically assigned by VMware NSX-T?

Options:

A.

NSE8_812 Question 8 Option 1

B.

8

C.

8

D.

8

Buy Now
Questions 9

Refer to the exhibit showing the history logs from a FortiMail device.

NSE8_812 Question 9

Which FortiMail email security feature can an administrator enable to treat these emails as spam?

Options:

A.

DKIM validation in a session profile

B.

Sender domain validation in a session profile

C.

Impersonation analysis in an antispam profile

D.

Soft fail SPF validation in an antispam profile

Buy Now
Questions 10

Which two types of interface have built-in active bypass in FortiDDoS devices? (Choose two.)

Options:

A.

SFP

B.

LC

C.

QSFP+

D.

Copper

E.

SFP+

Buy Now
Questions 11

A retail customer with a FortiADC HA cluster load balancing five webservers in L7 Full NAT mode is receiving reports of users not able to access their website during a sale event. But for clients that were able to connect, the website works fine.

CPU usage on the FortiADC and the web servers is low, application and database servers are still able to handle more traffic, and the bandwidth utilization is under 30%.

Which two options can resolve this situation? (Choose two.)

Options:

A.

Change the persistence rule to LB_PERSIS_SSL_SESSJD.

B.

Add more web servers to the real server poof

C.

Disable SSL between the FortiADC and the web servers

D.

Add a connection-pool to the FortiADC virtual server

Buy Now
Questions 12

You want to use the MTA adapter feature on FortiSandbox in an HA-Cluster. Which statement about this solution is true?

Options:

A.

The configuration of the MTA Adapter Local Interface is different than on port1.

B.

The MTA adapter is only available in the primary node.

C.

The MTA adapter mode is only detection mode.

D.

The configuration is different than on a standalone device.

Buy Now
Questions 13

Refer to the exhibits.

NSE8_812 Question 13

A customer has deployed a FortiGate with iBGP and eBGP routing enabled. HQ is receiving routes over eBGP from ISP 2; however, only certain routes are showing up in the routing table-Assume that BGP is working perfectly and that the only possible modifications to the routing table are solely due to the prefix list that is applied on HQ.

Given the exhibits, which two routes will be active in the routing table on the HQ firewall? (Choose two.)

Options:

A.

172.16.204.128/25

B.

172.16.201.96/29

C.

172,620,64,27

D.

172.16.204.64/27

Buy Now
Questions 14

Refer to the exhibit showing FortiGate configurations

NSE8_812 Question 14

FortiManager VM high availability (HA) is not functioning as expected after being added to an existing deployment.

The administrator finds that VRRP HA mode is selected, but primary and secondary roles are greyed out in the GUI The managed devices never show online when FMG-B becomes primary, but they will show online whenever the FMG-A becomes primary.

What change will correct HA functionality in this scenario?

Options:

A.

Change the FortiManager IP address on the managed FortiGate to 10.3.106.65.

B.

Make the monitored IP to match on both FortiManager devices.

C.

Unset the primary and secondary roles in the FortiManager CLI configuration so VRRP will decide who is primary.

D.

Change the priority of FMG-A to be numerically lower for higher preference

Buy Now
Questions 15

Refer to the exhibits, which show a firewall policy configuration and a network topology.

NSE8_812 Question 15

An administrator has configured an inbound SSL inspection profile on a FortiGate device (FG-1) that is protecting a data center hosting multiple web pages-Given the scenario shown in the exhibits, which certificate will FortiGate use to handle requests to xyz.com?

Options:

A.

FortiGate will fall-back to the default Fortinet_CA_SSL certificate.

B.

FortiGate will reject the connection since no certificate is defined.

C.

FortiGate will use the Fortinet_CA_Untrusted certificate for the untrusted connection,

D.

FortiGate will use the first certificate in the server-cert list—the abc.com certificate

Buy Now
Questions 16

Refer to the exhibit showing a FortiSOAR playbook.

NSE8_812 Question 16

You are investigating a suspicious e-mail alert on FortiSOAR, and after reviewing the executed playbook, you can see that it requires intervention.

What should be your next step?

Options:

A.

Go to the Incident Response tasks dashboard and run the pending actions

B.

Click on the notification icon on FortiSOAR GUI and run the pending input action

C.

Run the Mark Drive by Download playbook action

D.

Reply to the e-mail with the requested Playbook action

Buy Now
Questions 17

Refer to the exhibit.

NSE8_812 Question 17

What is happening in this scenario?

Options:

A.

The user status changed at FortiClient EMS to off-net.

B.

The user is authenticating against a FortiGate Captive Portal.

C The user is authenticating against an IdP.

C.

The user has not authenticated on their external browser.

Buy Now
Questions 18

A customer wants to use the FortiAuthenticator REST API to retrieve an SSO group called SalesGroup. The following API call is being made with the 'curl' utility:

NSE8_812 Question 18

Which two statements correctly describe the expected behavior of the FortiAuthenticator REST API? (Choose two.)

Options:

A.

Only users with the "Full permission" role can access the REST API

B.

This API call will fail because it requires that API version 2

C.

If the REST API web service access key is lost, it cannot be retrieved and must be changed.

D.

The syntax is incorrect because the API calls needs the get method.

Buy Now
Questions 19

Refer to the exhibit.

NSE8_812 Question 19

To facilitate a large-scale deployment of SD-WAN/ADVPN with FortiGate devices, you are tasked with configuring the FortiGate devices to support injecting of IKE routes on the ADVPN shortcut tunnels.

Which three commands must be added or changed to the FortiGate spoke config vpn ipsec phasei-interface options referenced in the exhibit for the VPN interface to enable this capability? (Choose three.)

Options:

A.

set net-device disable

B.

set mode-cfg enable

C.

set ike-version 1

D.

set add-route enable

E.

set mode-cfg-allow-client-selector enable

Buy Now
Questions 20

Refer to the exhibit.

NSE8_812 Question 20

A customer has deployed a FortiGate 300E with virtual domains (VDOMs) enabled in the multi-VDOM mode. There are three VDOMs: Root is for management and internet access, while VDOM 1 and VDOM 2 are used for segregating internal traffic. AccountVInk and SalesVInk are standard VDOM links in Ethernet mode.

Given the exhibit, which two statements below about VDOM behavior are correct? (Choose two.)

Options:

A.

You can apply OSPF routing on the VDOM link in either PPP or Ethernet mode

B.

Traffic on AccountVInk and SalesVInk will not be accelerated.

C.

The VDOM links are in Ethernet mode because they have IP addressed assigned on both sides.

D.

Root VDOM is an Admin type VDOM, while VDOM 1 and VDOM 2 are Traffic type VDOMs.

E.

OSPF routing can be configured between VDOM 1 and Root VDOM without any configuration changes to AccountVInk

Buy Now
Questions 21

You are responsible for recommending an adapter type for NICs on a FortiGate VM that will run on an ESXi Hypervisor. Your recommendation must consider performance as the main concern, cost is not a factor. Which adapter type for the NICs will you recommend?

Options:

A.

Native ESXi Networking with E1000

B.

Virtual Function (VF) PCI Passthrough

C.

Native ESXi Networking with VMXNET3

D.

Physical Function (PF) PCI Passthrough

Buy Now
Questions 22

Refer to the exhibit.

NSE8_812 Question 22

You have deployed a security fabric with three FortiGate devices as shown in the exhibit. FGT_2 has the following configuration:

NSE8_812 Question 22

FGT_1 and FGT_3 are configured with the default setting. Which statement is true for the synchronization of fabric-objects?

Options:

A.

Objects from the FortiGate FGT_2 will be synchronized to the upstream FortiGate.

B.

Objects from the root FortiGate will only be synchronized to FGT__2.

C.

Objects from the root FortiGate will not be synchronized to any downstream FortiGate.

D.

Objects from the root FortiGate will only be synchronized to FGT_3.

Buy Now
Questions 23

Refer to the exhibit.

NSE8_812 Question 23

Given the exhibit, which two statements about FortiGate FGSP HA cluster behavior are correct? (Choose two.)

Options:

A.

You can run FortiGate Virtual Router Redundancy Protocol (VRRP) high availability in addition to FGSP simultaneously.

B.

Session synchronization occurs over Layer 3 by default, and if unavailable it will then try Layer 2.

C.

You can selectively synchronize only specific sessions between FGSP cluster members.

D.

Cluster members will upgrade one at a time and failover during firmware upgrades.

Buy Now
Questions 24

Refer to the exhibits.

NSE8_812 Question 24

The exhibit shows a FortiGate model device that will be used for zero touch provisioning and a CLI Template.

NSE8_812 Question 24

To facilitate a more efficient roll out of FortiGate devices, you are tasked with using meta fields with the CLI Template to configure the DHCP server on the "office1" FortiGate.

Given this scenario, what would be the output of the config ip-range section on the CLI Template?

Options:

A.

NSE8_812 Question 24 Option 1

B.

24

C.

24

D.

24

Buy Now
Questions 25

Refer to the exhibit containing the configuration snippets from the FortiGate. Customer requirements:

NSE8_812 Question 25

• SSLVPN Portal must be accessible on standard HTTPS port (TCP/443)

• Public IP address (129.11.1.100) is assigned to portl

• Datacenter.acmecorp.com resolves to the public IP address assigned to portl

The customer has a Let's Encrypt certificate that is going to expire soon and it reports that subsequent attempts to renew that certificate are failing.

Reviewing the requirement and the exhibit, which configuration change below will resolve this issue?

A)

NSE8_812 Question 25

B)

NSE8_812 Question 25

C)

NSE8_812 Question 25

D)

NSE8_812 Question 25

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 26

A Hub FortiGate is connecting multiple branch FortiGate devices separating the traffic centrally in unique VRFs. Routing information is exchanged using BGP between the Hub and the Branch FortiGate devices.

You want to efficiently enable route leaking of specific routes between the VRFs.

Which two steps are required to achieve this requirement? (Choose two.)

Options:

A.

Create a vdom link between VRF10 and VRF12

B.

Enable Multi-VDOM mode on the Hub FortiGate and add a VDOM to connect VRF10 and VRF12

C.

Enable BGP recursive routing on the HUB FortiGate

D.

Configure route-maps to leak the selected routes using BGP

Buy Now
Questions 27

Refer to the exhibits, which show a network topology and VPN configuration.

NSE8_812 Question 27

A network administrator has been tasked with modifying the existing dial-up IPsec VPN infrastructure to detect the path quality to the remote endpoints.

After applying the configuration shown in the configuration exhibit, the VPN clients can still connect and access the protected 172.16.205.0/24 network, but no SLA information shows up for the client tunnels when issuing the diagnose sys link-monitor tunnel all command on the FortiGate CLI.

What is wrong with the configuration?

Options:

A.

SLA link monitoring does not work with the net-device setting.

B.

The admin needs to disable the mode-cfg setting.

C.

IPsec Phase1 Interface has to be configured in IPsec main mode.

D.

It is necessary to use the IKEv2 protocol in this situation.

Buy Now
Questions 28

You are migrating the branches of a customer to FortiGate devices. They require independent routing tables on the LAN side of the network.

After reviewing the design, you notice the firewall will have many BGP sessions as you have two data centers (DC) and two ISPs per DC while each branch is using at least 10 internal segments.

Based on this scenario, what would you suggest as the more efficient solution, considering that in the future the number of internal segments, DCs or internet links per DC will increase?

Options:

A.

No change in design is needed as even small FortiGate devices have a large memory capacity.

B.

Acquire a FortiGate model with more capacity, considering the next 5 years growth.

C.

Implement network-id, neighbor-group and increase the advertisement-interval

D.

Redesign the SD-WAN deployment to only use a single VPN tunnel and segment traffic using VRFs on BGP

Buy Now
Questions 29

Refer to the exhibit, which shows a FortiGate configuration snippet.

NSE8_812 Question 29

A customer in Costa Rica has a FortiGate with SD-WAN configured to use a VPN connection to the United States to browse the internet using a public IP from that country. They would like to enable the SD-WAN rule using a webhook.

Which configuration must be added to the FortiGate, and which type of HTTP request must be used to accomplish this? (Choose two.)

Options:

A.

NSE8_812 Question 29 Option 1

B.

29

C.

29

D.

29

Buy Now
Questions 30

Refer to the exhibits.

NSE8_812 Question 30

An administrator has configured a FortiGate and Forti Authenticator for two-factor authentication with FortiToken push notifications for their SSL VPN login. Upon initial review of the setup, the administrator has discovered that the customers can manually type in their two-factor code and authenticate but push notifications do not work

Based on the information given in the exhibits, what must be done to fix this?

Options:

A.

On FG-1 port1, the ftm access protocol must be enabled.

B.

FAC-1 must have an internet routable IP address for push notifications.

C.

On FG-1 CLI, the ftm-push server setting must point to 100.64.141.

D.

On FAC-1, the FortiToken public IP setting must point to 100.64.1 41

Buy Now
Questions 31

A customer is planning on moving their secondary data center to a cloud-based laaS. They want to place all the Oracle-based systems Oracle Cloud, while the other systems will be on Microsoft Azure with ExpressRoute service to their main data center.

They have about 200 branches with two internet services as their only WAN connections. As a security consultant you are asked to design an architecture using Fortinet products with security, redundancy and performance as a priority.

Which two design options are true based on these requirements? (Choose two.)

Options:

A.

Systems running on Azure will need to go through the main data center to access the services on Oracle Cloud.

B.

Use FortiGate VM for IPSEC over ExpressRoute, as traffic is not encrypted by Azure.

C.

Branch FortiGate devices must be configured as VPN clients for the branches' internal network to be able to access Oracle services without using public IPs.

D.

Two ExpressRoute services to the main data center are required to implement SD-WAN between a FortiGate VM in Azure and a FortiGate device at the data center edge

Buy Now
Exam Code: NSE8_812
Exam Name: Network Security Expert 8 Written Exam
Last Update: Mar 12, 2025
Questions: 105

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now NSE8_812 testing engine

PDF (Q&A)

$42  $104.99
buy now NSE8_812 pdf