Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Network Security Expert 8 Written Exam Question and Answers

Network Security Expert 8 Written Exam

Last Update Sep 14, 2025
Total Questions : 105

We are offering FREE NSE8_812 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare NSE8_812 free exam questions and then go for complete pool of Network Security Expert 8 Written Exam test questions that will help you more.

NSE8_812 pdf

NSE8_812 PDF

$36.75  $104.99
NSE8_812 Engine

NSE8_812 Testing Engine

$43.75  $124.99
NSE8_812 PDF + Engine

NSE8_812 PDF + Testing Engine

$57.75  $164.99
Questions 1

You are running a diagnose command continuously as traffic flows through a platform with NP6 and you obtain the following output:

Given the information shown in the output, which two statements are true? (Choose two.)

Options:

A.  

Enabling bandwidth control between the ISF and the NP will change the output

B.  

The output is showing a packet descriptor queue accumulated counter

C.  

Enable HPE shaper for the NP6 will change the output

D.  

Host-shortcut mode is enabled.

E.  

There are packet drops at the XAUI.

Discussion 0
Questions 2

Refer to the exhibit showing FortiGate configurations

FortiManager VM high availability (HA) is not functioning as expected after being added to an existing deployment.

The administrator finds that VRRP HA mode is selected, but primary and secondary roles are greyed out in the GUI The managed devices never show online when FMG-B becomes primary, but they will show online whenever the FMG-A becomes primary.

What change will correct HA functionality in this scenario?

Options:

A.  

Change the FortiManager IP address on the managed FortiGate to 10.3.106.65.

B.  

Make the monitored IP to match on both FortiManager devices.

C.  

Unset the primary and secondary roles in the FortiManager CLI configuration so VRRP will decide who is primary.

D.  

Change the priority of FMG-A to be numerically lower for higher preference

Discussion 0
Questions 3

Refer to the exhibits.

The exhibits show a FortiMail network topology, Inbound configuration settings, and a Dictionary Profile.

You are required to integrate a third-party's host service (srv.thirdparty.com) into the e-mail processing path.

All inbound e-mails must be processed by FortiMail antispam and antivirus with FortiSandbox integration. If the email is clean, FortiMail must forward it to the third-party service, which will send the email back to FortiMail for final delivery, FortiMail must not scan the e-mail again.

Which three configuration tasks must be performed to meet these requirements? (Choose three.)

Options:

A.  

Change the scan order in FML-GW to antispam-sandbox-content.

B.  

Apply the Catch-Ail profile to the CFInbound profile and configure a content action profile to deliver to the srv. thirdparty. com FQDN

C.  

Create an access receive rule with a Sender value of srv. thirdparcy.com, Recipient value of *@acme.com, and action value of Safe

D.  

Apply the Catch-AII profile to the ASinbound profile and configure an access delivery rule to deliver to the 100.64.0.72 host.

E.  

Create an IP policy with a Source value of 100. 64 .0.72/32, enable precedence, and place the policy at the top of the list.

Discussion 0
Questions 4

An administrator discovers that CPU utilization of a FortiGate-200F is high and determines that no traffic is being accelerated by hardware.

Why is no traffic being accelerated by hardware?

Options:

A.  

Oper-session-accounting is enabled under np6xlite config.

B.  

strict-dirty-session-check is enabled in global config.

C.  

check-protocol-header is set to strict in the global config.

D.  

delay-tcp-npu-session is enabled under the firewall policy.

Discussion 0
Questions 5

Refer to the exhibit.

A customer is trying to setup a Playbook automation using a FortiAnalyzer, FortiWeb and FortiGate. The intention is to have the FortiGate quarantine any source of SQL Injection detected by the FortiWeb. They got the automation stitch to trigger on the FortiGate when simulating an attack to their website, but the quarantine object was created with the IP 0.0.0.0. Referring to the configuration and logs in the exhibits, which two statements are true? (Choose two.)

Options:

A.  

The Group By option in the handler should be different to src, so src can be used on the Playbook configuration.

B.  

FortiSOC Playbooks combining FortiWeb and FortiGate are not supported.

C.  

To diagnose this issue, you need to use the commanddiagnose test application oftpd 22.

D.  

The FortiAnalyzer ADOM Type must be Fabric.

E.  

To fix the issue the parameter for script on the Playbook configuration should be epip.

Discussion 0
Questions 6

Which two types of interface have built-in active bypass in FortiDDoS devices? (Choose two.)

Options:

A.  

SFP

B.  

LC

C.  

QSFP+

D.  

Copper

E.  

SFP+

Discussion 0
Questions 7

Refer to the exhibit.

A FortiWeb appliance is configured for load balancing web sessions to internal web servers. The Server Pool is configured as shown in the exhibit.

How will the sessions be load balanced between server 1 and server 2 during normal operation?

Options:

A.  

Server 1 will receive 25% of the sessions, Server 2 will receive 75% of the sessions

B.  

Server 1 will receive 20% of the sessions, Server 2 will receive 66.6% of the sessions

C.  

Server 1 will receive 33.3% of the sessions, Server 2 will receive 66 6% of the sessions

D.  

Server 1 will receive 0% of the sessions Server 2 will receive 100% of the sessions

Discussion 0
Questions 8

Refer to the exhibit, which shows a FortiGate configuration snippet.

A customer in Costa Rica has a FortiGate with SD-WAN configured to use a VPN connection to the United States to browse the internet using a public IP from that country. They would like to enable the SD-WAN rule using a webhook.

Which configuration must be added to the FortiGate, and which type of HTTP request must be used to accomplish this? (Choose two.)

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 9

Refer to the exhibit.

You are deploying a FortiGate 6000F. The device should be directly connected to a switch. In the future, a new hardware module providing higher speed will be installed in the switch, and the connection to the FortiGate must be moved to this higher-speed port.

You must ensure that the initial FortiGate interface connected to the switch does not affect any other port when the new module is installed and the new port speed is defined.

How should the initial connection be made?

Options:

A.  

Connect the switch on any interface between ports 21 to 24

B.  

Connect the switch on any interface between ports 25 to 28

C.  

Connect the switch on any interface between ports 1 to 4

D.  

Connect the switch on any interface between ports 5 to 8.

Discussion 0
Questions 10

Refer to the exhibit, which shows an SD-WAN configuration.

You configured the SD-WAN from Branch1 to the HUB and enabled packet duplication. You later notice that the traffic is not being duplicated. In this scenario, what is causing this problem?

Options:

A.  

There is a mismatch in the FortiOS version between Branch1 and HUB.

B.  

Traffic cannot be duplicated over multiple zones.

C.  

Packet duplication is not enabled on the HUB side.

D.  

Packet duplication did not occur because an interface is out of SLA.

Discussion 0
Questions 11

Refer to the exhibits.

A customer wants to deploy 12 FortiAP 431F devices on high density conference center, but they do not currently have any PoE switches to connect them to. They want to be able to run them at full power while having network redundancy

From the FortiSwitch models and sample retail prices shown in the exhibit, which build of materials would have the lowest cost, while fulfilling the customer's requirements?

Options:

A.  

1x FortiSwitch 248EFPOE

B.  

2x FortiSwitch 224E-POE

C.  

2x FortiSwitch 248E-FPOE

D.  

2x FortiSwitch 124E-FPOE

Discussion 0
Questions 12

Refer to the exhibits.

During the implementation of a Fortinet Security Fabric configuration, CLI commands were issued in the order shown in the exhibit. On the next day, the local admin for FGTC issues the following command:

FGTC # config system csf

set configuration-sync default

end

In this scenario, which outcome is true regarding the "subnet_1" firewall address object on FGTC?

Options:

A.  

The object will only be automatically created on FGTC if it is modified on FGTA-1.

B.  

The object needs to be recreated on FGTA-1 before it is automatically created on FGTC.

C.  

The object is not automatically created.

D.  

The object is automatically created.

Discussion 0
Questions 13

Refer to the exhibits.

A customer is trying to restore a VPN connection configured on a FortiGate. Exhibits show output during a troubleshooting session when the VPN was working and the current baseline VPN configuration.

Which configuration parameters will restore VPN connectivity based on the diagnostic output?

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 14

You are troubleshooting a FortiMail Cloud service integrated with Office 365 where outgoing emails are not reaching the recipients' mail What are two possible reasons for this problem? (Choose two.)

Options:

A.  

The FortiMail access control rule to relay from Office 365 servers FQDN is missing.

B.  

The FortiMail DKIM key was not set using the Auto Generation option.

C.  

The FortiMail access control rules to relay from Office 365 servers public IPs are missing.

D.  

A Mail Flow connector from the Exchange Admin Center has not been set properly to the FortiMail Cloud FQDN.

Discussion 0
Questions 15

Refer to the exhibit.

To facilitate a large-scale deployment of SD-WAN/ADVPN with FortiGate devices, you are tasked with configuring the FortiGate devices to support injecting of IKE routes on the ADVPN shortcut tunnels.

Which three commands must be added or changed to the FortiGate spoke config vpn ipsec phasei-interface options referenced in the exhibit for the VPN interface to enable this capability? (Choose three.)

Options:

A.  

set net-device disable

B.  

set mode-cfg enable

C.  

set ike-version 1

D.  

set add-route enable

E.  

set mode-cfg-allow-client-selector enable

Discussion 0
Questions 16

Which feature must you enable on the BGP neighbors to accomplish this goal?

Options:

A.  

Graceful-restart

B.  

Deterministic-med

C.  

Synchronization

D.  

Soft-reconfiguration

Discussion 0
Questions 17

Which two statements are correct on a FortiGate using the FortiGuard Outbreak Protection Service (VOS)? (Choose two.)

Options:

A.  

The FortiGuard VOS can be used only with proxy-base policy inspections.

B.  

If third-party AV database returns a match the scanned file is deemed to be malicious.

C.  

The antivirus database queries FortiGuard with the hash of a scanned file

D.  

The AV engine scan must be enabled to use the FortiGuard VOS feature

E.  

The hash signatures are obtained from the FortiGuard Global Threat Intelligence database.

Discussion 0
Questions 18

Refer to the exhibit.

A customer wants FortiClient EMS configured to deploy to 1500 endpoints. The deployment will be integrated with FortiOS and there is an Active Directory server.

Given the configuration shown in the exhibit, which two statements about the installation are correct? (Choose two.)

Options:

A.  

If no client update time is specified on EMS, the user will be able to choose the time of installation if they wish to delay.

B.  

A client can be eligible for multiple enabled configurations on the EMS server, and one will be chosen based on first priority

C.  

You can only deploy initial installations to Windows clients.

D.  

You must use Standard or Enterprise SQL Server rather than the included SQL Server Express

E.  

The Windows clients only require "File and Printer Sharing0 allowed and the rest is handled by Active Directory group policy

Discussion 0
Questions 19

Refer to the exhibit.

A customer reports that they are not able to reach subnet 10.10.10.0/24 from their FortiGate device.

Based on the exhibit, what should you do to correct the situation?

Options:

A.  

Enable iBGP multipath

B.  

Enable recursive resolution for BGP routes

C.  

Enable next-hop-self feature

D.  

Enable additional-path feature

Discussion 0
Questions 20

On a FortiGate Configured in Transparent mode, which configuration option allows you to control Multicast traffic passing through the?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 21

Refer to the exhibit, which shows the high availability configuration for the FortiAuthenticator (FAC1).

Based on this information, which statement is true about the next FortiAuthenticator (FAC2) member that will join an HA cluster with this FortiAuthenticator (FAC1)?

Options:

A.  

FAC2 can only process requests when FAC1 fails.

B.  

FAC2 can have its HA interface on a different network than FAC1.

C.  

The FortiToken license will need to be installed on the FAC2.

D.  

FSSO sessions from FAC1 will be synchronized to FAC2.

Discussion 0
Questions 22

A customer with a FortiDDoS 200F protecting their fibre optic internet connection from incoming traffic sees that all the traffic was dropped by the device even though they were not under a DoS attack. The traffic flow was restored after it was rebooted using the GUI. Which two options will prevent this situation in the future? (Choose two)

Options:

A.  

Change the Adaptive Mode.

B.  

Create an HA setup with a second FortiDDoS 200F

C.  

Move the internet connection from the SFP interfaces to the LC interfaces

D.  

Replace with a FortiDDoS 1500F

Discussion 0
Questions 23

Refer to the exhibits, which show a network topology and VPN configuration.

A network administrator has been tasked with modifying the existing dial-up IPsec VPN infrastructure to detect the path quality to the remote endpoints.

After applying the configuration shown in the configuration exhibit, the VPN clients can still connect and access the protected 172.16.205.0/24 network, but no SLA information shows up for the client tunnels when issuing the diagnose sys link-monitor tunnel all command on the FortiGate CLI.

What is wrong with the configuration?

Options:

A.  

SLA link monitoring does not work with the net-device setting.

B.  

The admin needs to disable the mode-cfg setting.

C.  

IPsec Phase1 Interface has to be configured in IPsec main mode.

D.  

It is necessary to use the IKEv2 protocol in this situation.

Discussion 0
Questions 24

Refer to the exhibit.

Given the exhibit, which two statements about FortiGate FGSP HA cluster behavior are correct? (Choose two.)

Options:

A.  

You can run FortiGate Virtual Router Redundancy Protocol (VRRP) high availability in addition to FGSP simultaneously.

B.  

Session synchronization occurs over Layer 3 by default, and if unavailable it will then try Layer 2.

C.  

You can selectively synchronize only specific sessions between FGSP cluster members.

D.  

Cluster members will upgrade one at a time and failover during firmware upgrades.

Discussion 0
Questions 25

Review the following FortiGate-6000 configuration excerpt:

Based on the configuration, which statement is correct regarding SNAT source port partitioning behavior?

Options:

A.  

It dynamically distributes SNAT source ports to operating FPCs or FPMs.

B.  

It is the default SNAT configuration and preserves active sessions when an FPC or FPM goes down.

C.  

It statically distributes SNAT source ports to operating FPCs or FPMs

D.  

It equally distributes SNAT source ports across chassis slots.

Discussion 0
Questions 26

Refer to the exhibit.

You need to create a base SD-WAN configuration that includes SD-WAN rules and Performance SLAs for spoke sites with various connectivity types. It needs to be done in a way that can be easily applied to new sites with a minimum amount of change. How should you create the SD-WAN zones?

Options:

A.  

With members and assign overlay interfaces

B.  

With members without interface assignments

C.  

With no members configured

D.  

With members and assign interfaces but do not specify a gateway

Discussion 0
Questions 27

You are creating the CLI script to be used on a new SD-WAN deployment You will have branches with a different number of internet connections and want to be sure there is no need to change the Performance SLA configuration in case more connections are added to the branch.

The current configuration is:

Which configuration do you use for the Performance SLA members?

Options:

A.  

set members any

B.  

set members 0

C.  

current configuration already fulfills the requirement

D.  

set members all

Discussion 0
Questions 28

Refer to the exhibit showing a FortiView monitor screen.

After a Secure SD-WAN implementation a customer reports that in FortiAnalyzer under FortiView Secure SD-WAN Monitor there is No Device for selection.

What can cause this issue?

Options:

A.  

Upload option from FortiGate to FortiAnalyzer is not set as a real time.

B.  

Extended logging is not enabled on FortiGate.

C.  

ADOM 1 is set as a Fabric ADOM.

D.  

sla-fail-log-period and sla-pass-log-period on FortiGate health check is not set.

Discussion 0
Questions 29

Review the Application Control log.

Which configuration caused the IPS engine to generate this log?

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 30

A customer wants to use the FortiAuthenticator REST API to retrieve an SSO group called SalesGroup. The following API call is being made with the 'curl' utility:

Which two statements correctly describe the expected behavior of the FortiAuthenticator REST API? (Choose two.)

Options:

A.  

Only users with the "Full permission" role can access the REST API

B.  

This API call will fail because it requires that API version 2

C.  

If the REST API web service access key is lost, it cannot be retrieved and must be changed.

D.  

The syntax is incorrect because the API calls needs the get method.

Discussion 0
Questions 31

Refer to the exhibit.

You have been tasked with replacing the managed switch Forti Switch 2 shown in the topology.

Which two actions are correct regarding the replacement process? (Choose two.)

Options:

A.  

After replacing the FortiSwitch unit, the automatically created trunk name does not change

B.  

CLAG-ICL needs to be manually reconfigured once the new switch is connected to the FortiGate

C.  

After replacing the FortiSwitch unit, the automatically created trunk name changes.

D.  

MCLAG-ICL will be automatically reconfigured once the new switch is connected to the FortiGate.

Discussion 0