Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Network Security Expert > NSE8_812

NSE8_812 Network Security Expert 8 Written Exam Question and Answers

Question # 4

On a FortiGate Configured in Transparent mode, which configuration option allows you to control Multicast traffic passing through the?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 5

You must analyze an event that happened at 20:37 UTC. One log relevant to the event is extracted from FortiGate logs:

The devices and the administrator are all located in different time zones Daylight savings time (DST) is disabled

• The FortiGate is at GMT-1000.

• The FortiAnalyzer is at GMT-0800

• Your browser local time zone is at GMT-03.00

You want to review this log on FortiAnalyzer GUI, what time should you use as a filter?

A.

20:37:08

B.

10:37:08

C.

17:37:08

D.

12.37:08

Full Access
Question # 6

Refer to the exhibit.

FortiManager is configured with the Jinja Script under CLI Templates shown in the exhibit.

Which two statements correctly describe the expected behavior when running this template? (Choose two.)

A.

The Jinja template will automatically map the interface with "WAN" role on the managed FortiGate.

B.

The template will work if you change the variable format to $(WAN).

C.

The template will work if you change the variable format to {{ WAN }}.

D.

The administrator must first manually map the interface for each device with a meta field.

E.

The template will fail because this configuration can only be applied with a CLI or TCL script.

Full Access
Question # 7

A FortiGate must be configured to accept VoIP traffic which will include session initiation protocol (SIP) traffic. Which statement about the VoIP configuration options is correct?

A.

Restricting SIP requests is only possible when using the SIP Session Helper.

B.

Rate tracking of SIP requests is only possible when the application layer gateway (ALG) is set to Flow mode.

C.

FortiOS cannot accept SIP traffic if both the SIP Session Helper and the application layer gateway (ALG) are disabled.

D.

By default, VoIP traffic will be processed using the SIP Session Helper.

Full Access
Question # 8

A customer has FortiAP devices in three branch offices managed from a FortiGate in the HQ. Each FortiAP is connected to a dedicated management VLAN.

The customer wants the users connected to the FortiAP SSIDs to use the branch local internet connection, but each branch uses a different VLAN ID for the bridge. HQ users travel to different branches and connect to the same SSID.

Which configuration option will solve this requirement?

A.

Set each FortiAP to a wtp-group and use set vlan-pooling wtp-group on the VAP configuration with the corresponding VLAN ID configuration for each group.

B.

Set a FortiAuthenticator for 802.1x authentication with the Tunnel-Type attribute set to VLAN and use set dynamic-vlan enable on the VAP configuration.

C.

Use set vlan-pooling round-robin on the VAP configuration with the corresponding vlan-pool.

D.

Use set vlan-pooling hash on the VAP configuration with the corresponding vlan-pool.

Full Access
Question # 9

What is the benefit of using FortiGate NAC LAN Segments?

A.

It provides support for multiple DHCP servers within the same VLAN.

B.

It provides physical isolation without changing the IP address of hosts.

C.

It provides support for IGMP snooping between hosts within the same VLAN

D.

It allows for assignment of dynamic address objects matching NAC policy.

Full Access
Question # 10

Refer to the exhibit.

The Company Corp administrator has enabled Workflow mode in FortiManager and has assigned approval roles to the current administrators. However, workflow approval does not function as expected. The CTO is currently unable to approve submitted changes.

Given the exhibit, which two possible solutions will resolve the workflow approval problems with the Workflow_72 ADOM? (Choose two.)

A.

The CTO must have a defined email address for their admin user account.

B.

The CTO and CISO need to swap Approval Groups so that the highest authority is in Group #1.

C.

The CTO must have Standard access level or higher for FortiManager.

D.

The CISO must have a higher access level than "Read_Only_User" in FortiManager.

E.

The CTO needs to be added to "Email Notification" in the Workflow_72 ADOM.

Full Access
Question # 11

Refer to the exhibit showing a FortiView monitor screen.

After a Secure SD-WAN implementation a customer reports that in FortiAnalyzer under FortiView Secure SD-WAN Monitor there is No Device for selection.

What can cause this issue?

A.

Upload option from FortiGate to FortiAnalyzer is not set as a real time.

B.

Extended logging is not enabled on FortiGate.

C.

ADOM 1 is set as a Fabric ADOM.

D.

sla-fail-log-period and sla-pass-log-period on FortiGate health check is not set.

Full Access
Question # 12

Which two statements are correct on a FortiGate using the FortiGuard Outbreak Protection Service (VOS)? (Choose two.)

A.

The FortiGuard VOS can be used only with proxy-base policy inspections.

B.

If third-party AV database returns a match the scanned file is deemed to be malicious.

C.

The antivirus database queries FortiGuard with the hash of a scanned file

D.

The AV engine scan must be enabled to use the FortiGuard VOS feature

E.

The hash signatures are obtained from the FortiGuard Global Threat Intelligence database.

Full Access
Question # 13

You want to use the MTA adapter feature on FortiSandbox in an HA-Cluster. Which statement about this solution is true?

A.

The configuration of the MTA Adapter Local Interface is different than on port1.

B.

The MTA adapter is only available in the primary node.

C.

The MTA adapter mode is only detection mode.

D.

The configuration is different than on a standalone device.

Full Access
Question # 14

Review the Application Control log.

Which configuration caused the IPS engine to generate this log?

A.

B.

C.

D.

Full Access
Question # 15

You are designing a setup where the FortiGate device is connected to two upstream ISPs using BGP. Part of the requirement is that you must be able to refresh the route advertisements manually without disconnecting the BGP neighborships.

Which feature must you enable on the BGP neighbors to accomplish this goal?

A.

Synchronization

B.

Deterministic-med

C.

Graceful-restart

D.

Soft-reconfiguration

Full Access
Question # 16

Refer to the exhibits.

The exhibit shows a FortiGate model device that will be used for zero touch provisioning and a CLI Template.

To facilitate a more efficient roll out of FortiGate devices, you are tasked with using meta fields with the CLI Template to configure the DHCP server on the "office1" FortiGate.

Given this scenario, what would be the output of the config ip-range section on the CLI Template?

A.

B.

C.

D.

Full Access
Question # 17

An administrator discovers that CPU utilization of a FortiGate-200F is high and determines that no traffic is being accelerated by hardware.

Why is no traffic being accelerated by hardware?

A.

Oper-session-accounting is enabled under np6xlite config.

B.

strict-dirty-session-check is enabled in global config.

C.

check-protocol-header is set to strict in the global config.

D.

delay-tcp-npu-session is enabled under the firewall policy.

Full Access
Question # 18

Refer to the exhibit.

A customer needs to create a multi-tier MCLAG set up with the topology as shown in the exhibit.

A1/A2

B1/B2

C1/C2

Which command snippet should be applied to it, to allow active/active links in this topology?

A.

B.

C.

D.

Full Access
Question # 19

Refer to the exhibits.

A customer is trying to restore a VPN connection configured on a FortiGate. Exhibits show output during a troubleshooting session when the VPN was working and the current baseline VPN configuration.

Which configuration parameters will restore VPN connectivity based on the diagnostic output?

A.

B.

C.

D.

Full Access
Question # 20

Refer to the exhibits.

A customer is looking for a solution to authenticate the clients connected to a hardware switch interface of a FortiGate 400E.

Referring to the exhibits, which two conditions allow authentication to the client devices before assigning an IP address? (Choose two.)

A.

FortiGate devices with NP6 and hardware switch interfaces cannot support 802.1X authentication.

B.

Devices connected directly to ports 3 and 4 can perform 802 1X authentication.

C.

Ports 3 and 4 can be part of different switch interfaces.

D.

Client devices must have 802 1X authentication enabled

Full Access
Question # 21

Refer to the exhibit.

You are deploying a FortiGate 6000F. The device should be directly connected to a switch. In the future, a new hardware module providing higher speed will be installed in the switch, and the connection to the FortiGate must be moved to this higher-speed port.

You must ensure that the initial FortiGate interface connected to the switch does not affect any other port when the new module is installed and the new port speed is defined.

How should the initial connection be made?

A.

Connect the switch on any interface between ports 21 to 24

B.

Connect the switch on any interface between ports 25 to 28

C.

Connect the switch on any interface between ports 1 to 4

D.

Connect the switch on any interface between ports 5 to 8.

Full Access
Question # 22

Refer to the exhibit.

A customer has deployed a FortiGate 200F high-availability (HA) cluster that contains & TPM chip. The exhibit shows output from the FortiGate CLI session where the administrator enabled TPM.

Following these actions, the administrator immediately notices that both FortiGate high availability (HA) status and FortiManager status for the FortiGate are negatively impacted.

What are the two reasons for this behavior? (Choose two.)

A.

The private-data-encryption key entered on the primary did not match the value that the TPM expected.

B.

Configuration for TPM is not synchronized between FortiGate HA cluster members.

C.

The FortiGate has not finished the auto-update process to synchronize the new configuration to FortiManager yet.

D.

TPM functionality is not yet compatible with FortiGate HA.

E.

The administrator needs to manually enter the hex private data encryption key in FortiManager.

Full Access
Question # 23

A remote IT Team is in the process of deploying a FortiGate in their lab. The closed environment has been configured to support zero-touch provisioning from the FortiManager, on the same network, via DHCP options. After waiting 15 minutes, they are reporting that the FortiGate received an IP address, but the zero-touch process failed.

The exhibit below shows what the IT Team provided while troubleshooting this issue:

Which statement explains why the FortiGate did not install its configuration from the FortiManager?

A.

The FortiGate was not configured with the correct pre-shared key to connect to the FortiManager

B.

The DHCP server was not configured with the FQDN of the FortiManager

C.

The DHCP server used the incorrect option type for the FortiManager IP address.

D.

The configuration was modified on the FortiGate prior to connecting to the FortiManager

Full Access
Question # 24

Refer to the exhibit.

You have been tasked with replacing the managed switch Forti Switch 2 shown in the topology.

Which two actions are correct regarding the replacement process? (Choose two.)

A.

After replacing the FortiSwitch unit, the automatically created trunk name does not change

B.

CLAG-ICL needs to be manually reconfigured once the new switch is connected to the FortiGate

C.

After replacing the FortiSwitch unit, the automatically created trunk name changes.

D.

MCLAG-ICL will be automatically reconfigured once the new switch is connected to the FortiGate.

Full Access
Question # 25

Refer to the exhibits.

A customer has deployed a FortiGate with iBGP and eBGP routing enabled. HQ is receiving routes over eBGP from ISP 2; however, only certain routes are showing up in the routing table-Assume that BGP is working perfectly and that the only possible modifications to the routing table are solely due to the prefix list that is applied on HQ.

Given the exhibits, which two routes will be active in the routing table on the HQ firewall? (Choose two.)

A.

172.16.204.128/25

B.

172.16.201.96/29

C.

172,620,64,27

D.

172.16.204.64/27

Full Access
Question # 26

Refer to the CLI configuration of an SSL inspection profile from a FortiGate device configured to protect a web server:

Based on the information shown, what is the expected behavior when an HTTP/2 request comes in?

A.

FortiGate will reject all HTTP/2 ALPN headers.

B.

FortiGate will strip the ALPN header and forward the traffic.

C.

FortiGate will rewrite the ALPN header to request HTTP/1.

D.

FortiGate will forward the traffic without modifying the ALPN header.

Full Access
Question # 27

Refer to the exhibit, which shows a FortiGate configuration snippet.

A customer in Costa Rica has a FortiGate with SD-WAN configured to use a VPN connection to the United States to browse the internet using a public IP from that country. They would like to enable the SD-WAN rule using a webhook.

Which configuration must be added to the FortiGate, and which type of HTTP request must be used to accomplish this? (Choose two.)

A.

B.

C.

D.

Full Access
Question # 28

You are responsible for recommending an adapter type for NICs on a FortiGate VM that will run on an ESXi Hypervisor. Your recommendation must consider performance as the main concern, cost is not a factor. Which adapter type for the NICs will you recommend?

A.

Native ESXi Networking with E1000

B.

Virtual Function (VF) PCI Passthrough

C.

Native ESXi Networking with VMXNET3

D.

Physical Function (PF) PCI Passthrough

Full Access
Question # 29

Refer to the exhibit.

Given the exhibit, which two statements about FortiGate FGSP HA cluster behavior are correct? (Choose two.)

A.

You can run FortiGate Virtual Router Redundancy Protocol (VRRP) high availability in addition to FGSP simultaneously.

B.

Session synchronization occurs over Layer 3 by default, and if unavailable it will then try Layer 2.

C.

You can selectively synchronize only specific sessions between FGSP cluster members.

D.

Cluster members will upgrade one at a time and failover during firmware upgrades.

Full Access
Question # 30

An administrator has configured a FortiGate device to authenticate SSL VPN users using digital certificates. A FortiAuthenticator is the certificate authority (CA) and the OCSP server.

Part of the FortiGate configuration is shown below:

Based on this configuration, which authentication scenario will FortiGate deny?

A.

The user certificate does not contain the OCSP URL.

B.

FortiAuthenticator responds to an OCSP request that the user certificate authority is untrusted.

C.

FortiAuthenticator responds to an OCSP request that the user certificate status is unknown.

Full Access
Question # 31

Refer to the exhibits.

Exhibit A

Exhibit B

Exhibit C

A customer is trying to set up a VPN with a FortiGate, but they do not have a backup of the configuration. Output during a troubleshooting session is shown in the exhibits A and B and a baseline VPN configuration is shown in Exhibit C Referring to the exhibits, which configuration will restore VPN connectivity?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access