Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

NSE8_812 Network Security Expert 8 Written Exam Questions and Answers

Questions 4

A remote IT Team is in the process of deploying a FortiGate in their lab. The closed environment has been configured to support zero-touch provisioning from the FortiManager, on the same network, via DHCP options. After waiting 15 minutes, they are reporting that the FortiGate received an IP address, but the zero-touch process failed.

The exhibit below shows what the IT Team provided while troubleshooting this issue:

Which statement explains why the FortiGate did not install its configuration from the FortiManager?

Options:

A.

The FortiGate was not configured with the correct pre-shared key to connect to the FortiManager

B.

The DHCP server was not configured with the FQDN of the FortiManager

C.

The DHCP server used the incorrect option type for the FortiManager IP address.

D.

The configuration was modified on the FortiGate prior to connecting to the FortiManager

Buy Now
Questions 5

You are responsible for recommending an adapter type for NICs on a FortiGate VM that will run on an ESXi Hypervisor. Your recommendation must consider performance as the main concern, cost is not a factor. Which adapter type for the NICs will you recommend?

Options:

A.

Native ESXi Networking with E1000

B.

Virtual Function (VF) PCI Passthrough

C.

Native ESXi Networking with VMXNET3

D.

Physical Function (PF) PCI Passthrough

Buy Now
Questions 6

You are migrating the branches of a customer to FortiGate devices. They require independent routing tables on the LAN side of the network.

After reviewing the design, you notice the firewall will have many BGP sessions as you have two data centers (DC) and two ISPs per DC while each branch is using at least 10 internal segments.

Based on this scenario, what would you suggest as the more efficient solution, considering that in the future the number of internal segments, DCs or internet links per DC will increase?

Options:

A.

No change in design is needed as even small FortiGate devices have a large memory capacity.

B.

Acquire a FortiGate model with more capacity, considering the next 5 years growth.

C.

Implement network-id, neighbor-group and increase the advertisement-interval

D.

Redesign the SD-WAN deployment to only use a single VPN tunnel and segment traffic using VRFs on BGP

Buy Now
Questions 7

Which two statements about bounce address tagging and verification (BATV) on FortiMail are true? (Choose two.)

Options:

A.

You must publish the BATV public key as a DNS TXT record.

B.

Emails with an empty sender address will be subjected to bounce verification.

C.

FortiMail will insert the BATV tag to the sender address in the envelope.

D.

BATV will use symmetric keys to verify the bounce address tag.

Buy Now
Questions 8

A FortiGate running FortiOS 7.2.0 GA is configured in multi-vdom mode with a vdom set to vdom type Admin and another vdom set to vdom type Traffic.

Which two GUI sections are available on both VDOM types? (Choose two.)

Options:

A.

Interface configuration

B.

Packet capture

C.

Security Fabric topology and external connectors

D.

Certificates

E.

FortiClient configuration

Buy Now
Questions 9

Refer to the exhibit containing the configuration snippets from the FortiGate. Customer requirements:

• SSLVPN Portal must be accessible on standard HTTPS port (TCP/443)

• Public IP address (129.11.1.100) is assigned to portl

• Datacenter.acmecorp.com resolves to the public IP address assigned to portl

The customer has a Let's Encrypt certificate that is going to expire soon and it reports that subsequent attempts to renew that certificate are failing.

Reviewing the requirement and the exhibit, which configuration change below will resolve this issue?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 10

Which two methods are supported for importing user defined Lookup Table Data into the FortiSIEM? (Choose two.)

Options:

A.

Report

B.

FTP

C.

API

D.

SCP

Buy Now
Questions 11

Refer to The exhibit showing a FortiEDR configuration.

Based on the exhibit, which statement is correct?

Options:

A.

The presence of a cryptolocker malware at rest on the filesystem will be detected by the Ransomware Prevention security policy.

B.

FortiEDR Collector will not collect OS Metadata.

C.

If a malicious file is executed and attempts to establish a connection it will generate duplicate events.

D.

If an unresolved file rule is triggered, by default the file is logged but not blocked.

Buy Now
Questions 12

Refer to the exhibits, which show a network topology and VPN configuration.

A network administrator has been tasked with modifying the existing dial-up IPsec VPN infrastructure to detect the path quality to the remote endpoints.

After applying the configuration shown in the configuration exhibit, the VPN clients can still connect and access the protected 172.16.205.0/24 network, but no SLA information shows up for the client tunnels when issuing the diagnose sys link-monitor tunnel all command on the FortiGate CLI.

What is wrong with the configuration?

Options:

A.

SLA link monitoring does not work with the net-device setting.

B.

The admin needs to disable the mode-cfg setting.

C.

IPsec Phase1 Interface has to be configured in IPsec main mode.

D.

It is necessary to use the IKEv2 protocol in this situation.

Buy Now
Questions 13

Refer to the exhibit showing an SD-WAN configuration.

According to the exhibit, if an internal user pings 10.1.100.2 and 10.1.100.22 from subnet 172.16.205.0/24, which outgoing interfaces will be used?

Options:

A.

port16 and port1

B.

port1 and port1

C.

port16 and port15

D.

port1 and port15

Buy Now
Questions 14

Refer to The exhibit, which shows a topology diagram.

A customer wants to use SD-WAN for traffic generated from the data center towards Branches. SD-WAN on HUB should follow the underlay condition on each Branch and the solution should be scalable for hundreds of Branches.

Which SD WAN-Rules strategy should be used?

Options:

A.

Manual based on route-tags

B.

Lowest Cost SLA

C.

Auto based on link quality

D.

Best Quality based on route-tags

Buy Now
Questions 15

An automation stitch was configured using an incoming webhook as the trigger named 'my_incoming_webhook'. The action is configured to execute the CLI Script shown:

Options:

A.

data: ‘{ “hostname”: “bad_host_1”, “ip”: [“1.1.1.1”]}’

url: http://192.168.226.129/api/v2/monitor/system/automation-stitch/webhook/my_incoming_webhook

B.

data: ‘{ “hostname”: “bad_host_1”, “ip”: “1.1.1.1”}’

url: http://192.168.226.129/api/v2/monitor/system/automation-stitch/webhook/my_incoming_webhook

C.

data: ‘{ “hostname”: “bad_host_1”, “ip”: [“1.1.1.1”]}’

url: http://192.168.226.129/api/v2/cmdb/system/automation-stitch/webhook/my_incoming_webhook

D.

data: ‘{ “hostname”: “bad_host_1”, “ip”: “1.1.1.1”}’

url:http://192.168.226.129/api/v2/cmdb/system/automation-stitch/webhook/my_incoming_webhook

Buy Now
Questions 16

Refer to the exhibit.

You have deployed a security fabric with three FortiGate devices as shown in the exhibit. FGT_2 has the following configuration:

FGT_1 and FGT_3 are configured with the default setting. Which statement is true for the synchronization of fabric-objects?

Options:

A.

Objects from the FortiGate FGT_2 will be synchronized to the upstream FortiGate.

B.

Objects from the root FortiGate will only be synchronized to FGT__2.

C.

Objects from the root FortiGate will not be synchronized to any downstream FortiGate.

D.

Objects from the root FortiGate will only be synchronized to FGT_3.

Buy Now
Questions 17

Refer to the exhibit.

An HTTPS access proxy is configured to demonstrate its function as a reverse proxy on behalf of the web server it is protecting. It verifies user identity, device identity, and trust context, before granting access to the protected source. It is assumed that the FortiGate EMS fabric connector has already been successfully connected.

You need to ensure that ZTNA access through the FortiGate will redirect users to the FortiAuthenticator to perform username/password and multifactor authentication to validate access prior to accessing resources behind the FortiGate.

In this scenario, which two further steps need to be taken on the FortiGate? (Choose two.)

Options:

A.

Create a SAML user/server object referring to the FortiAuthenticator.

B.

Create an authentication rule that sets the sso-auth-method to the FortiAuthenticator.

C.

Create an authentication scheme with the "method" as SAML.

D.

Create a firewall rule that allows access from the remote endpoint to the resources behind the FortiGate.

Buy Now
Questions 18

A customer is operating a FortiWeb cluster in a high volume active-active HA group consisting of eight FortiWeb appliances. One of the secondary members is handling traffic for one specific VIP.

What will happen with the traffic if that secondary FortiWeb appliance fails?

Options:

A.

Traffic will be redirected to the next appliance in the same traffic group.

B.

Traffic will be redistributed by the primary appliance to the remaining secondary appliances.

C.

Traffic will be redistributed by the primary appliance to the remaining secondary appliances that are configured to handle traffic for that specific VIP.

D.

Traffic will be redirected to the secondary member with the least number of sessions.

Buy Now
Questions 19

Refer to the exhibits.

The exhibits show a FortiMail network topology, Inbound configuration settings, and a Dictionary Profile.

You are required to integrate a third-party's host service (srv.thirdparty.com) into the e-mail processing path.

All inbound e-mails must be processed by FortiMail antispam and antivirus with FortiSandbox integration. If the email is clean, FortiMail must forward it to the third-party service, which will send the email back to FortiMail for final delivery, FortiMail must not scan the e-mail again.

Which three configuration tasks must be performed to meet these requirements? (Choose three.)

Options:

A.

Change the scan order in FML-GW to antispam-sandbox-content.

B.

Apply the Catch-Ail profile to the CFInbound profile and configure a content action profile to deliver to the srv. thirdparty. com FQDN

C.

Create an access receive rule with a Sender value of srv. thirdparcy.com, Recipient value of *@acme.com, and action value of Safe

D.

Apply the Catch-AII profile to the ASinbound profile and configure an access delivery rule to deliver to the 100.64.0.72 host.

E.

Create an IP policy with a Source value of 100. 64 .0.72/32, enable precedence, and place the policy at the top of the list.

Buy Now
Questions 20

Review the Application Control log.

Which configuration caused the IPS engine to generate this log?

Options:

A.

B.

C.

D.

Buy Now
Questions 21

You must analyze an event that happened at 20:37 UTC. One log relevant to the event is extracted from FortiGate logs:

The devices and the administrator are all located in different time zones Daylight savings time (DST) is disabled

• The FortiGate is at GMT-1000.

• The FortiAnalyzer is at GMT-0800

• Your browser local time zone is at GMT-03.00

You want to review this log on FortiAnalyzer GUI, what time should you use as a filter?

Options:

A.

20:37:08

B.

10:37:08

C.

17:37:08

D.

12.37:08

Buy Now
Questions 22

Refer to the exhibit.

A customer reports that they are not able to reach subnet 10.10.10.0/24 from their FortiGate device.

Based on the exhibit, what should you do to correct the situation?

Options:

A.

Enable iBGP multipath

B.

Enable recursive resolution for BGP routes

C.

Enable next-hop-self feature

D.

Enable additional-path feature

Buy Now
Questions 23

Refer to the exhibit.

A customer wants FortiClient EMS configured to deploy to 1500 endpoints. The deployment will be integrated with FortiOS and there is an Active Directory server.

Given the configuration shown in the exhibit, which two statements about the installation are correct? (Choose two.)

Options:

A.

If no client update time is specified on EMS, the user will be able to choose the time of installation if they wish to delay.

B.

A client can be eligible for multiple enabled configurations on the EMS server, and one will be chosen based on first priority

C.

You can only deploy initial installations to Windows clients.

D.

You must use Standard or Enterprise SQL Server rather than the included SQL Server Express

E.

The Windows clients only require "File and Printer Sharing0 allowed and the rest is handled by Active Directory group policy

Buy Now
Questions 24

Refer to the exhibits.

You are configuring a Let's Encrypt certificate to enable SSL protection to your website. When FortiWeb tries to retrieve the certificate, you receive a certificate status failed, as shown below.

Based on the Server Policy settings shown in the exhibit, which two configuration changes will resolve this issue? (Choose two.)

Options:

A.

Disable Redirect HTTP to HTTPS in the Server Policy.

B.

Remove the Web Protection Profile from this Server Policy.

C.

Enable HTTP service in the Server Policy.

D.

Configure a TXT record of the domain and point to the IP address of the Virtual Server.

Buy Now
Questions 25

You are designing a setup where the FortiGate device is connected to two upstream ISPs using BGP. Part of the requirement is that you must be able to refresh the route advertisements manually without disconnecting the BGP neighborships.

Which feature must you enable on the BGP neighbors to accomplish this goal?

Options:

A.

Synchronization

B.

Deterministic-med

C.

Graceful-restart

D.

Soft-reconfiguration

Buy Now
Questions 26

Refer to the CLI output:

Given the information shown in the output, which two statements are correct? (Choose two.)

Options:

A.

Geographical IP policies are enabled and evaluated after local techniques.

B.

Attackers can be blocked before they target the servers behind the FortiWeb.

C.

The IP Reputation feature has been manually updated

D.

An IP address that was previously used by an attacker will always be blocked

E.

Reputation from blacklisted IP addresses from DHCP or PPPoE pools can be restored

Buy Now
Questions 27

You are deploying a FortiExtender (FEX) on a FortiGate-60F. The FEX will be managed by the FortiGate. You anticipate high utilization. The requirement is to minimize the overhead on the device for WAN traffic.

Which action achieves the requirement in this scenario?

Options:

A.

Add a switch between the FortiGate and FEX.

B.

Enable CAPWAP connectivity between the FortiGate and the FortiExtender.

C.

Change connectivity between the FortiGate and the FortiExtender to use VLAN Mode

D.

Add a VLAN under the FEX-WAN interface on the FortiGate.

Buy Now
Questions 28

Refer to the exhibit.

Given the exhibit, which two statements about FortiGate FGSP HA cluster behavior are correct? (Choose two.)

Options:

A.

You can run FortiGate Virtual Router Redundancy Protocol (VRRP) high availability in addition to FGSP simultaneously.

B.

Session synchronization occurs over Layer 3 by default, and if unavailable it will then try Layer 2.

C.

You can selectively synchronize only specific sessions between FGSP cluster members.

D.

Cluster members will upgrade one at a time and failover during firmware upgrades.

Buy Now
Questions 29

Which feature must you enable on the BGP neighbors to accomplish this goal?

Options:

A.

Graceful-restart

B.

Deterministic-med

C.

Synchronization

D.

Soft-reconfiguration

Buy Now
Questions 30

An administrator discovers that CPU utilization of a FortiGate-200F is high and determines that no traffic is being accelerated by hardware.

Why is no traffic being accelerated by hardware?

Options:

A.

Oper-session-accounting is enabled under np6xlite config.

B.

strict-dirty-session-check is enabled in global config.

C.

check-protocol-header is set to strict in the global config.

D.

delay-tcp-npu-session is enabled under the firewall policy.

Buy Now
Questions 31

A customer would like to improve the performance of a FortiGate VM running in an Azure D4s_v3 instance, but they already purchased a BYOL VM04 license.

Which two actions will improve performance the most without making a FortiGate license change? (Choose two.)

Options:

A.

Migrate the FortiGate to an Azure F4s_v2.

B.

Enable "Accelerated networking" on the Azure network interfaces.

C.

Enable SR-IOV on the FortiGate.

D.

Migrate the FortiGate to an Azure D8s_v3.

Buy Now
Exam Code: NSE8_812
Exam Name: Network Security Expert 8 Written Exam
Last Update: Nov 20, 2025
Questions: 105
NSE8_812 pdf

NSE8_812 PDF

$29.75  $84.99
NSE8_812 Engine

NSE8_812 Testing Engine

$35  $99.99
NSE8_812 PDF + Engine

NSE8_812 PDF + Testing Engine

$47.25  $134.99