Black Friday Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet NSE8_812 Network Security Expert 8 Written Exam Exam Practice Test

Page: 1 / 6
Total 60 questions

Network Security Expert 8 Written Exam Questions and Answers

Question 1

Refer to the exhibit showing FortiGate configurations

Question # 1

FortiManager VM high availability (HA) is not functioning as expected after being added to an existing deployment.

The administrator finds that VRRP HA mode is selected, but primary and secondary roles are greyed out in the GUI The managed devices never show online when FMG-B becomes primary, but they will show online whenever the FMG-A becomes primary.

What change will correct HA functionality in this scenario?

Options:

A.

Change the FortiManager IP address on the managed FortiGate to 10.3.106.65.

B.

Make the monitored IP to match on both FortiManager devices.

C.

Unset the primary and secondary roles in the FortiManager CLI configuration so VRRP will decide who is primary.

D.

Change the priority of FMG-A to be numerically lower for higher preference

Question 2

A remote IT Team is in the process of deploying a FortiGate in their lab. The closed environment has been configured to support zero-touch provisioning from the FortiManager, on the same network, via DHCP options. After waiting 15 minutes, they are reporting that the FortiGate received an IP address, but the zero-touch process failed.

The exhibit below shows what the IT Team provided while troubleshooting this issue:

Question # 2

Which statement explains why the FortiGate did not install its configuration from the FortiManager?

Options:

A.

The FortiGate was not configured with the correct pre-shared key to connect to the FortiManager

B.

The DHCP server was not configured with the FQDN of the FortiManager

C.

The DHCP server used the incorrect option type for the FortiManager IP address.

D.

The configuration was modified on the FortiGate prior to connecting to the FortiManager

Question 3

Refer to the exhibits.

Question # 3

Question # 3

A customer wants to deploy 12 FortiAP 431F devices on high density conference center, but they do not currently have any PoE switches to connect them to. They want to be able to run them at full power while having network redundancy

From the FortiSwitch models and sample retail prices shown in the exhibit, which build of materials would have the lowest cost, while fulfilling the customer's requirements?

Options:

A.

1x FortiSwitch 248EFPOE

B.

2x FortiSwitch 224E-POE

C.

2x FortiSwitch 248E-FPOE

D.

2x FortiSwitch 124E-FPOE

Question 4

You are running a diagnose command continuously as traffic flows through a platform with NP6 and you obtain the following output:

Question # 4

Given the information shown in the output, which two statements are true? (Choose two.)

Options:

A.

Enabling bandwidth control between the ISF and the NP will change the output

B.

The output is showing a packet descriptor queue accumulated counter

C.

Enable HPE shaper for the NP6 will change the output

D.

Host-shortcut mode is enabled.

E.

There are packet drops at the XAUI.

Question 5

A remote worker requests access to an SSH server inside the network. You deployed a ZTNA Rule to their FortiClient. You need to follow the security requirements to inspect this traffic.

Which two statements are true regarding the requirements? (Choose two.)

Options:

A.

FortiGate can perform SSH access proxy host-key validation.

B.

You need to configure a FortiClient SSL-VPN tunnel to inspect the SSH traffic.

C.

SSH traffic is tunneled between the client and the access proxy over HTTPS

D.

Traffic is discarded as ZTNA does not support SSH connection rules

Question 6

Refer to the exhibits.

Exhibit A

Question # 6

Exhibit B

Question # 6

Exhibit C

Question # 6

A customer is trying to set up a VPN with a FortiGate, but they do not have a backup of the configuration. Output during a troubleshooting session is shown in the exhibits A and B and a baseline VPN configuration is shown in Exhibit C Referring to the exhibits, which configuration will restore VPN connectivity?

A)

Question # 6

B)

Question # 6

C)

Question # 6

D)

Question # 6

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 7

Which two methods are supported for importing user defined Lookup Table Data into the FortiSIEM? (Choose two.)

Options:

A.

Report

B.

FTP

C.

API

D.

SCP

Question 8

What is the benefit of using FortiGate NAC LAN Segments?

Options:

A.

It provides support for multiple DHCP servers within the same VLAN.

B.

It provides physical isolation without changing the IP address of hosts.

C.

It provides support for IGMP snooping between hosts within the same VLAN

D.

It allows for assignment of dynamic address objects matching NAC policy.

Question 9

A customer is planning on moving their secondary data center to a cloud-based laaS. They want to place all the Oracle-based systems Oracle Cloud, while the other systems will be on Microsoft Azure with ExpressRoute service to their main data center.

They have about 200 branches with two internet services as their only WAN connections. As a security consultant you are asked to design an architecture using Fortinet products with security, redundancy and performance as a priority.

Which two design options are true based on these requirements? (Choose two.)

Options:

A.

Systems running on Azure will need to go through the main data center to access the services on Oracle Cloud.

B.

Use FortiGate VM for IPSEC over ExpressRoute, as traffic is not encrypted by Azure.

C.

Branch FortiGate devices must be configured as VPN clients for the branches' internal network to be able to access Oracle services without using public IPs.

D.

Two ExpressRoute services to the main data center are required to implement SD-WAN between a FortiGate VM in Azure and a FortiGate device at the data center edge

Question 10

Refer to the exhibit showing the history logs from a FortiMail device.

Question # 10

Which FortiMail email security feature can an administrator enable to treat these emails as spam?

Options:

A.

DKIM validation in a session profile

B.

Sender domain validation in a session profile

C.

Impersonation analysis in an antispam profile

D.

Soft fail SPF validation in an antispam profile

Question 11

Refer to the exhibits.

Question # 11

The exhibits show a FortiGate network topology and the output of the status of high availability on the FortiGate.

Given this information, which statement is correct?

Options:

A.

The ethertype values of the HA packets are 0x8890, 0x8891, and 0x8892

B.

The cluster mode can support a maximum of four (4) FortiGate VMs

C.

The cluster members are on the same network and the IP addresses were statically assigned.

D.

FGVMEVLQOG33WM3D and FGVMEVGCJNHFYI4A share a virtual MAC address.

Question 12

You are responsible for recommending an adapter type for NICs on a FortiGate VM that will run on an ESXi Hypervisor. Your recommendation must consider performance as the main concern, cost is not a factor. Which adapter type for the NICs will you recommend?

Options:

A.

Native ESXi Networking with E1000

B.

Virtual Function (VF) PCI Passthrough

C.

Native ESXi Networking with VMXNET3

D.

Physical Function (PF) PCI Passthrough

Question 13

Refer to the exhibit.

Question # 13

The exhibit shows two error messages from a FortiGate root Security Fabric device when you try to configure a new connection to a FortiClient EMS Server.

Referring to the exhibit, which two actions will fix these errors? (Choose two.)

Options:

A.

Verify that the CRL is accessible from the root FortiGate

B.

Export and import the FortiClient EMS server certificate to the root FortiGate.

C.

Install a new known CA on the Win2K16-EMS server.

D.

Authorize the root FortiGate on the FortiClient EMS

Question 14

An automation stitch was configured using an incoming webhook as the trigger named 'my_incoming_webhook'. The action is configured to execute the CLI Script shown:

Question # 14

A)

Question # 14

B)

Question # 14

C)

Question # 14

D)

Question # 14

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 15

An administrator has configured a FortiGate device to authenticate SSL VPN users using digital certificates. A FortiAuthenticator is the certificate authority (CA) and the Online Certificate Status Protocol (OCSP) server.

Part of the FortiGate configuration is shown below:

Question # 15

Based on this configuration, which two statements are true? (Choose two.)

Options:

A.

OCSP checks will always go to the configured FortiAuthenticator

B.

The OCSP check of the certificate can be combined with a certificate revocation list.

C.

OCSP certificate responses are never cached by the FortiGate.

D.

If the OCSP server is unreachable, authentication will succeed if the certificate matches the CA.

Question 16

Refer to the exhibit.

Question # 16

You have deployed a security fabric with three FortiGate devices as shown in the exhibit. FGT_2 has the following configuration:

Question # 16

FGT_1 and FGT_3 are configured with the default setting. Which statement is true for the synchronization of fabric-objects?

Options:

A.

Objects from the FortiGate FGT_2 will be synchronized to the upstream FortiGate.

B.

Objects from the root FortiGate will only be synchronized to FGT__2.

C.

Objects from the root FortiGate will not be synchronized to any downstream FortiGate.

D.

Objects from the root FortiGate will only be synchronized to FGT_3.

Question 17

An HA topology is using the following configuration:

Question # 17

Based on this configuration, how long will it take for a failover to be detected by the secondary cluster member?

Options:

A.

600ms

B.

200ms

C.

300ms

D.

100ms

Question 18

Refer to the exhibit.

Question # 18

A customer has deployed a FortiGate 300E with virtual domains (VDOMs) enabled in the multi-VDOM mode. There are three VDOMs: Root is for management and internet access, while VDOM 1 and VDOM 2 are used for segregating internal traffic. AccountVInk and SalesVInk are standard VDOM links in Ethernet mode.

Given the exhibit, which two statements below about VDOM behavior are correct? (Choose two.)

Options:

A.

You can apply OSPF routing on the VDOM link in either PPP or Ethernet mode

B.

Traffic on AccountVInk and SalesVInk will not be accelerated.

C.

The VDOM links are in Ethernet mode because they have IP addressed assigned on both sides.

D.

Root VDOM is an Admin type VDOM, while VDOM 1 and VDOM 2 are Traffic type VDOMs.

E.

OSPF routing can be configured between VDOM 1 and Root VDOM without any configuration changes to AccountVInk

Page: 1 / 6
Total 60 questions