Easter Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

NSE8_812 Sample Questions Answers

Questions 4

A FortiGate deployment contains the following configuration:

What is the result of this configuration?

Options:

A.

Route-maps are not configurable in VDOM SERVICES

B.

Route-maps from the Root VDOM configuration are available in VDOM SERVICES

C.

Route-maps from VDOM SERVICES are available in all other VDOMs

D.

Route-maps for VDOM SERVICES are excluded from HA configuration synchronization

Questions 5

A FortiGate is configured to perform outbound firewall authentication with Azure AD as a SAML IdP.

What are two valid interactions that occur when the client attempts to access the internet? (Choose two.)

Options:

A.

FortiGate SP sends a SAML request to the IdP.

B.

The Microsoft SAML IdP sends the SAML response to the FortiGate SP.

C.

The client browser forwards the SAML response received from Microsoft SAML IdP to the FortiGate SP.

D.

FortiGate SP redirects the client browser to the local captive portal and then redirects to the Microsoft SAML IdP.

Buy Now
Questions 6

Refer to the exhibit.

You are managing a FortiSwitch 3032E that is managed by FortiLink on a FortiGate 3960E. The 3032E is heavily utilized and there is only one port free.

The requirement is to add an additional three FortiSwitch 448E devices with 10Gbps SFP+ connectivity directly to the 3032E. The plan is to use split port (phy-mode) with QSFP28 mode to connect the new 448E switches.

In this scenario, which statement about the switch deployment is correct?

Options:

A.

Additional ports on Switch 1 can be split for a maximum of 128 interfaces.

B.

The port most of Switch 1 must be changed to QSFP.

C.

After enabling split ports and rebooting Switch 1, the new ports can be configured from the FortiGate.

D.

Switches 2-4 will connect successfully with Switch 1 split port in QSFP28 mode.

Buy Now
Questions 7

Which two methods are supported for importing user defined Lookup Table Data into the FortiSIEM? (Choose two.)

Options:

A.

Report

B.

FTP

C.

API

D.

SCP

Buy Now
Questions 8

Refer to the exhibit.

You have been tasked with replacing the managed switch Forti Switch 2 shown in the topology.

Which two actions are correct regarding the replacement process? (Choose two.)

Options:

A.

After replacing the FortiSwitch unit, the automatically created trunk name does not change

B.

CLAG-ICL needs to be manually reconfigured once the new switch is connected to the FortiGate

C.

After replacing the FortiSwitch unit, the automatically created trunk name changes.

D.

MCLAG-ICL will be automatically reconfigured once the new switch is connected to the FortiGate.

Buy Now
Questions 9

Refer to the exhibits.

A FortiGate cluster (CL-1) protects a data center hosting multiple web applications. A pair of FortiADC devices are already configured for SSL decryption (FAD-1), and re-encryption (FAD-2). CL-1 must accept unencrypted traffic from FAD-1, perform application detection on the plain-text traffic, and forward the inspected traffic to FAD-2.

The SSL-Offload-App-Detect application list and SSL-Offload protocol options profile are applied to the firewall policy handling the web application traffic on CL-1.

Given this scenario, which two configuration tasks must the administrator perform on CL-1? (Choose two.)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 10

A customer's cybersecurity department needs to implement security for the traffic between two VPCs in AWS, but these belong to different departments within the company. The company uses a single region for all their VPCs.

Which two actions will achieve this requirement while keeping separate management of each department's VPC? (Choose two.)

Options:

A.

Create a transit VPC with a FortiGate HA cluster, connect to the other two using VPC peering, and use routing tables to force traffic through the FortiGate cluster.

B.

Create an 1AM account for the cybersecurity department to manage both existing VPC, create a FortiGate HA Cluster on each VPC and IPSEC VPN to force traffic between the VPCs through the FortiGate clusters

C.

Migrate all the instances to the same VPC and create 1AM accounts for each department, then implement a new subnet for a FortiGate auto-scaling group and use routing tables to force the traffic through the FortiGate cluster.

D.

Create a VPC with a FortiGate auto-scaling group with a Transit Gateway attached to the three VPC to force routing through the FortiGate cluster

Buy Now
Questions 11

An administrator has configured a FortiGate device to authenticate SSL VPN users using digital certificates. A FortiAuthenticator is the certificate authority (CA) and the Online Certificate Status Protocol (OCSP) server.

Part of the FortiGate configuration is shown below:

Based on this configuration, which two statements are true? (Choose two.)

Options:

A.

OCSP checks will always go to the configured FortiAuthenticator

B.

The OCSP check of the certificate can be combined with a certificate revocation list.

C.

OCSP certificate responses are never cached by the FortiGate.

D.

If the OCSP server is unreachable, authentication will succeed if the certificate matches the CA.

Buy Now
Questions 12

Refer to The exhibit showing a FortiEDR configuration.

Based on the exhibit, which statement is correct?

Options:

A.

The presence of a cryptolocker malware at rest on the filesystem will be detected by the Ransomware Prevention security policy.

B.

FortiEDR Collector will not collect OS Metadata.

C.

If a malicious file is executed and attempts to establish a connection it will generate duplicate events.

D.

If an unresolved file rule is triggered, by default the file is logged but not blocked.

Buy Now
Questions 13

Refer to the exhibit.

The exhibit shows two error messages from a FortiGate root Security Fabric device when you try to configure a new connection to a FortiClient EMS Server.

Referring to the exhibit, which two actions will fix these errors? (Choose two.)

Options:

A.

Verify that the CRL is accessible from the root FortiGate

B.

Export and import the FortiClient EMS server certificate to the root FortiGate.

C.

Install a new known CA on the Win2K16-EMS server.

D.

Authorize the root FortiGate on the FortiClient EMS

Buy Now
Questions 14

You are creating the CLI script to be used on a new SD-WAN deployment You will have branches with a different number of internet connections and want to be sure there is no need to change the Performance SLA configuration in case more connections are added to the branch.

The current configuration is:

Which configuration do you use for the Performance SLA members?

Options:

A.

set members any

B.

set members 0

C.

current configuration already fulfills the requirement

D.

set members all

Buy Now
Questions 15

You must analyze an event that happened at 20:37 UTC. One log relevant to the event is extracted from FortiGate logs:

The devices and the administrator are all located in different time zones Daylight savings time (DST) is disabled

• The FortiGate is at GMT-1000.

• The FortiAnalyzer is at GMT-0800

• Your browser local time zone is at GMT-03.00

You want to review this log on FortiAnalyzer GUI, what time should you use as a filter?

Options:

A.

20:37:08

B.

10:37:08

C.

17:37:08

D.

12.37:08

Questions 16

Refer to the exhibit, which shows the high availability configuration for the FortiAuthenticator (FAC1).

Based on this information, which statement is true about the next FortiAuthenticator (FAC2) member that will join an HA cluster with this FortiAuthenticator (FAC1)?

Options:

A.

FAC2 can only process requests when FAC1 fails.

B.

FAC2 can have its HA interface on a different network than FAC1.

C.

The FortiToken license will need to be installed on the FAC2.

D.

FSSO sessions from FAC1 will be synchronized to FAC2.

Questions 17

Refer to the exhibits, which show a network topology and VPN configuration.

A network administrator has been tasked with modifying the existing dial-up IPsec VPN infrastructure to detect the path quality to the remote endpoints.

After applying the configuration shown in the configuration exhibit, the VPN clients can still connect and access the protected 172.16.205.0/24 network, but no SLA information shows up for the client tunnels when issuing the diagnose sys link-monitor tunnel all command on the FortiGate CLI.

What is wrong with the configuration?

Options:

A.

SLA link monitoring does not work with the net-device setting.

B.

The admin needs to disable the mode-cfg setting.

C.

IPsec Phase1 Interface has to be configured in IPsec main mode.

D.

It is necessary to use the IKEv2 protocol in this situation.

Buy Now
Questions 18

Refer to the exhibit.

A customer needs to create a multi-tier MCLAG set up with the topology as shown in the exhibit.

A1/A2

B1/B2

C1/C2

Which command snippet should be applied to it, to allow active/active links in this topology?

Options:

A.

B.

C.

D.

Buy Now
Questions 19

A customer with a FortiDDoS 200F protecting their fibre optic internet connection from incoming traffic sees that all the traffic was dropped by the device even though they were not under a DoS attack. The traffic flow was restored after it was rebooted using the GUI. Which two options will prevent this situation in the future? (Choose two)

Options:

A.

Change the Adaptive Mode.

B.

Create an HA setup with a second FortiDDoS 200F

C.

Move the internet connection from the SFP interfaces to the LC interfaces

D.

Replace with a FortiDDoS 1500F

Buy Now
Questions 20

Refer to the exhibit showing an SD-WAN configuration.

According to the exhibit, if an internal user pings 10.1.100.2 and 10.1.100.22 from subnet 172.16.205.0/24, which outgoing interfaces will be used?

Options:

A.

port16 and port1

B.

port1 and port1

C.

port16 and port15

D.

port1 and port15

Buy Now
Questions 21

You are deploying a FortiExtender (FEX) on a FortiGate-60F. The FEX will be managed by the FortiGate. You anticipate high utilization. The requirement is to minimize the overhead on the device for WAN traffic.

Which action achieves the requirement in this scenario?

Options:

A.

Add a switch between the FortiGate and FEX.

B.

Enable CAPWAP connectivity between the FortiGate and the FortiExtender.

C.

Change connectivity between the FortiGate and the FortiExtender to use VLAN Mode

D.

Add a VLAN under the FEX-WAN interface on the FortiGate.

Buy Now
Questions 22

Which two statements about bounce address tagging and verification (BATV) on FortiMail are true? (Choose two.)

Options:

A.

You must publish the BATV public key as a DNS TXT record.

B.

Emails with an empty sender address will be subjected to bounce verification.

C.

FortiMail will insert the BATV tag to the sender address in the envelope.

D.

BATV will use symmetric keys to verify the bounce address tag.

Buy Now
Questions 23

A FortiGate running FortiOS 7.2.0 GA is configured in multi-vdom mode with a vdom set to vdom type Admin and another vdom set to vdom type Traffic.

Which two GUI sections are available on both VDOM types? (Choose two.)

Options:

A.

Interface configuration

B.

Packet capture

C.

Security Fabric topology and external connectors

D.

Certificates

E.

FortiClient configuration

Buy Now
Questions 24

Refer to the exhibit.

Given the exhibit, which two statements about FortiGate FGSP HA cluster behavior are correct? (Choose two.)

Options:

A.

You can run FortiGate Virtual Router Redundancy Protocol (VRRP) high availability in addition to FGSP simultaneously.

B.

Session synchronization occurs over Layer 3 by default, and if unavailable it will then try Layer 2.

C.

You can selectively synchronize only specific sessions between FGSP cluster members.

D.

Cluster members will upgrade one at a time and failover during firmware upgrades.

Buy Now
Questions 25

Refer to the exhibit showing the history logs from a FortiMail device.

Which FortiMail email security feature can an administrator enable to treat these emails as spam?

Options:

A.

DKIM validation in a session profile

B.

Sender domain validation in a session profile

C.

Impersonation analysis in an antispam profile

D.

Soft fail SPF validation in an antispam profile

Buy Now
Questions 26

Which feature must you enable on the BGP neighbors to accomplish this goal?

Options:

A.

Graceful-restart

B.

Deterministic-med

C.

Synchronization

D.

Soft-reconfiguration

Buy Now
Questions 27

Refer to the exhibit, which shows a multi-region SD-WAN architecture.

Given this scenario, which two statements are true? (Choose two.)

Options:

A.

If iBGP is used, cross-regional spoke-to-hub shortcuts can be established.

B.

If eBGP is used, ADVPN can be established for branch-to-branch traffic across regions.

C.

If eBGP is used, ADVPN can be established only for branch-to-branch traffic within each region.

D.

If iBGP is used, cross-regional spoke-to-hub shortcuts cannot be used.

Buy Now
Questions 28

Refer to the CLI output:

Given the information shown in the output, which two statements are correct? (Choose two.)

Options:

A.

Geographical IP policies are enabled and evaluated after local techniques.

B.

Attackers can be blocked before they target the servers behind the FortiWeb.

C.

The IP Reputation feature has been manually updated

D.

An IP address that was previously used by an attacker will always be blocked

E.

Reputation from blacklisted IP addresses from DHCP or PPPoE pools can be restored

Buy Now
Questions 29

Refer to the exhibit.

A customer wants FortiClient EMS configured to deploy to 1500 endpoints. The deployment will be integrated with FortiOS and there is an Active Directory server.

Given the configuration shown in the exhibit, which two statements about the installation are correct? (Choose two.)

Options:

A.

If no client update time is specified on EMS, the user will be able to choose the time of installation if they wish to delay.

B.

A client can be eligible for multiple enabled configurations on the EMS server, and one will be chosen based on first priority

C.

You can only deploy initial installations to Windows clients.

D.

You must use Standard or Enterprise SQL Server rather than the included SQL Server Express

E.

The Windows clients only require "File and Printer Sharing0 allowed and the rest is handled by Active Directory group policy

Buy Now
Questions 30

Refer to the exhibit.

A customer wants to automate the creation and configuration of FortiGate VM instances in a VMware vCenter environment using Terraform. They have the creation part working with the code shown in the exhibit.

Which code snippet will allow Terraform to automatically connect to a newly deployed FortiGate if its IP was dynamically assigned by VMware NSX-T?

Options:

A.

B.

C.

D.

Buy Now
Questions 31

Refer to the exhibit.

An HTTPS access proxy is configured to demonstrate its function as a reverse proxy on behalf of the web server it is protecting. It verifies user identity, device identity, and trust context, before granting access to the protected source. It is assumed that the FortiGate EMS fabric connector has already been successfully connected.

You need to ensure that ZTNA access through the FortiGate will redirect users to the FortiAuthenticator to perform username/password and multifactor authentication to validate access prior to accessing resources behind the FortiGate.

In this scenario, which two further steps need to be taken on the FortiGate? (Choose two.)

Options:

A.

Create a SAML user/server object referring to the FortiAuthenticator.

B.

Create an authentication rule that sets the sso-auth-method to the FortiAuthenticator.

C.

Create an authentication scheme with the "method" as SAML.

D.

Create a firewall rule that allows access from the remote endpoint to the resources behind the FortiGate.

Buy Now
Exam Code: NSE8_812
Exam Name: Network Security Expert 8 Written Exam
Last Update: Apr 17, 2025
Questions: 105
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now NSE8_812