Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Network Security Expert 8 Written Exam Question and Answers

Network Security Expert 8 Written Exam

Last Update Nov 22, 2025
Total Questions : 105

We are offering FREE NSE8_812 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare NSE8_812 free exam questions and then go for complete pool of Network Security Expert 8 Written Exam test questions that will help you more.

NSE8_812 pdf

NSE8_812 PDF

$36.75  $104.99
NSE8_812 Engine

NSE8_812 Testing Engine

$43.75  $124.99
NSE8_812 PDF + Engine

NSE8_812 PDF + Testing Engine

$57.75  $164.99
Questions 1

An automation stitch was configured using an incoming webhook as the trigger named 'my_incoming_webhook'. The action is configured to execute the CLI Script shown:

Options:

A.  

data: ‘{ “hostname”: “bad_host_1”, “ip”: [“1.1.1.1”]}’

url: http://192.168.226.129/api/v2/monitor/system/automation-stitch/webhook/my_incoming_webhook

B.  

data: ‘{ “hostname”: “bad_host_1”, “ip”: “1.1.1.1”}’

url: http://192.168.226.129/api/v2/monitor/system/automation-stitch/webhook/my_incoming_webhook

C.  

data: ‘{ “hostname”: “bad_host_1”, “ip”: [“1.1.1.1”]}’

url: http://192.168.226.129/api/v2/cmdb/system/automation-stitch/webhook/my_incoming_webhook

D.  

data: ‘{ “hostname”: “bad_host_1”, “ip”: “1.1.1.1”}’

url:http://192.168.226.129/api/v2/cmdb/system/automation-stitch/webhook/my_incoming_webhook

Discussion 0
Questions 2

A FortiGate is configured to perform outbound firewall authentication with Azure AD as a SAML IdP.

What are two valid interactions that occur when the client attempts to access the internet? (Choose two.)

Options:

A.  

FortiGate SP sends a SAML request to the IdP.

B.  

The Microsoft SAML IdP sends the SAML response to the FortiGate SP.

C.  

The client browser forwards the SAML response received from Microsoft SAML IdP to the FortiGate SP.

D.  

FortiGate SP redirects the client browser to the local captive portal and then redirects to the Microsoft SAML IdP.

Discussion 0
Questions 3

Refer to the CLI configuration of an SSL inspection profile from a FortiGate device configured to protect a web server:

Based on the information shown, what is the expected behavior when an HTTP/2 request comes in?

Options:

A.  

FortiGate will reject all HTTP/2 ALPN headers.

B.  

FortiGate will strip the ALPN header and forward the traffic.

C.  

FortiGate will rewrite the ALPN header to request HTTP/1.

D.  

FortiGate will forward the traffic without modifying the ALPN header.

Discussion 0
Questions 4

Refer to the exhibits.

A customer has deployed a FortiGate with iBGP and eBGP routing enabled. HQ is receiving routes over eBGP from ISP 2; however, only certain routes are showing up in the routing table-Assume that BGP is working perfectly and that the only possible modifications to the routing table are solely due to the prefix list that is applied on HQ.

Given the exhibits, which two routes will be active in the routing table on the HQ firewall? (Choose two.)

Options:

A.  

172.16.204.128/25

B.  

172.16.201.96/29

C.  

172,620,64,27

D.  

172.16.204.64/27

Discussion 0
Questions 5

Refer to the exhibit showing an SD-WAN configuration.

According to the exhibit, if an internal user pings 10.1.100.2 and 10.1.100.22 from subnet 172.16.205.0/24, which outgoing interfaces will be used?

Options:

A.  

port16 and port1

B.  

port1 and port1

C.  

port16 and port15

D.  

port1 and port15

Discussion 0
Questions 6

Refer to the exhibit.

You are operating an internal network with multiple OSPF routers on the same LAN segment. FGT_3 needs to be added to the OSPF network and has the configuration shown in the exhibit. FGT_3 is not establishing any OSPF connection.

What needs to be changed to the configuration to make sure FGT_3 will establish OSPF neighbors without affecting the DR/BDR election?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 7

Refer to the exhibits.

During the implementation of a Fortinet Security Fabric configuration, CLI commands were issued in the order shown in the exhibit. On the next day, the local admin for FGTC issues the following command:

FGTC # config system csf

set configuration-sync default

end

In this scenario, which outcome is true regarding the "subnet_1" firewall address object on FGTC?

Options:

A.  

The object will only be automatically created on FGTC if it is modified on FGTA-1.

B.  

The object needs to be recreated on FGTA-1 before it is automatically created on FGTC.

C.  

The object is not automatically created.

D.  

The object is automatically created.

Discussion 0
Questions 8

Refer to the exhibit showing a firewall policy configuration.

To prevent unauthorized access of their cloud assets, an administrator wants to enforce authentication on firewall policy ID 1.

What change does the administrator need to make?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 9

An administrator has configured a FortiGate device to authenticate SSL VPN users using digital certificates. A FortiAuthenticator is the certificate authority (CA) and the Online Certificate Status Protocol (OCSP) server.

Part of the FortiGate configuration is shown below:

Based on this configuration, which two statements are true? (Choose two.)

Options:

A.  

OCSP checks will always go to the configured FortiAuthenticator

B.  

The OCSP check of the certificate can be combined with a certificate revocation list.

C.  

OCSP certificate responses are never cached by the FortiGate.

D.  

If the OCSP server is unreachable, authentication will succeed if the certificate matches the CA.

Discussion 0
Questions 10

You are deploying a FortiExtender (FEX) on a FortiGate-60F. The FEX will be managed by the FortiGate. You anticipate high utilization. The requirement is to minimize the overhead on the device for WAN traffic.

Which action achieves the requirement in this scenario?

Options:

A.  

Add a switch between the FortiGate and FEX.

B.  

Enable CAPWAP connectivity between the FortiGate and the FortiExtender.

C.  

Change connectivity between the FortiGate and the FortiExtender to use VLAN Mode

D.  

Add a VLAN under the FEX-WAN interface on the FortiGate.

Discussion 0
Questions 11

Refer to the exhibit of a FortiNAC configuration.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.  

A device that is modeled in FortiNAC is connected on VLAN 4093.

B.  

An unknown host is connected to port3.

C.  

The IP address of the FortiSwitch is 10.12.240.2.

D.  

Port8 is connected to a FortiGate in FortiLink mode.

Discussion 0
Questions 12

Refer to the exhibits.

The exhibits show a FortiGate network topology and the output of the status of high availability on the FortiGate.

Given this information, which statement is correct?

Options:

A.  

The ethertype values of the HA packets are 0x8890, 0x8891, and 0x8892

B.  

The cluster mode can support a maximum of four (4) FortiGate VMs

C.  

The cluster members are on the same network and the IP addresses were statically assigned.

D.  

FGVMEVLQOG33WM3D and FGVMEVGCJNHFYI4A share a virtual MAC address.

Discussion 0
Questions 13

Refer to the exhibit.

What is happening in this scenario?

Options:

A.  

The user status changed at FortiClient EMS to off-net.

B.  

The user is authenticating against a FortiGate Captive Portal.

C The user is authenticating against an IdP.

C.  

The user has not authenticated on their external browser.

Discussion 0
Questions 14

Refer to the exhibit showing a FortiView monitor screen.

After a Secure SD-WAN implementation a customer reports that in FortiAnalyzer under FortiView Secure SD-WAN Monitor there is No Device for selection.

What can cause this issue?

Options:

A.  

Upload option from FortiGate to FortiAnalyzer is not set as a real time.

B.  

Extended logging is not enabled on FortiGate.

C.  

ADOM 1 is set as a Fabric ADOM.

D.  

sla-fail-log-period and sla-pass-log-period on FortiGate health check is not set.

Discussion 0
Questions 15

Refer to the exhibits.

The exhibits show a FortiMail network topology, Inbound configuration settings, and a Dictionary Profile.

You are required to integrate a third-party's host service (srv.thirdparty.com) into the e-mail processing path.

All inbound e-mails must be processed by FortiMail antispam and antivirus with FortiSandbox integration. If the email is clean, FortiMail must forward it to the third-party service, which will send the email back to FortiMail for final delivery, FortiMail must not scan the e-mail again.

Which three configuration tasks must be performed to meet these requirements? (Choose three.)

Options:

A.  

Change the scan order in FML-GW to antispam-sandbox-content.

B.  

Apply the Catch-Ail profile to the CFInbound profile and configure a content action profile to deliver to the srv. thirdparty. com FQDN

C.  

Create an access receive rule with a Sender value of srv. thirdparcy.com, Recipient value of *@acme.com, and action value of Safe

D.  

Apply the Catch-AII profile to the ASinbound profile and configure an access delivery rule to deliver to the 100.64.0.72 host.

E.  

Create an IP policy with a Source value of 100. 64 .0.72/32, enable precedence, and place the policy at the top of the list.

Discussion 0
Questions 16

Refer to the exhibits.

A customer is trying to restore a VPN connection configured on a FortiGate. Exhibits show output during a troubleshooting session when the VPN was working and the current baseline VPN configuration.

Which configuration parameters will restore VPN connectivity based on the diagnostic output?

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 17

You are running a diagnose command continuously as traffic flows through a platform with NP6 and you obtain the following output:

Given the information shown in the output, which two statements are true? (Choose two.)

Options:

A.  

Enabling bandwidth control between the ISF and the NP will change the output

B.  

The output is showing a packet descriptor queue accumulated counter

C.  

Enable HPE shaper for the NP6 will change the output

D.  

Host-shortcut mode is enabled.

E.  

There are packet drops at the XAUI.

Discussion 0
Questions 18

Refer to the exhibit.

The exhibit shows the topology a customer wants to implement using a flexible authentication scheme. Users connecting from trusted remote locations are authenticated using only their username/password when connecting to the SSLVPN FortiGate in the data center.

When connecting from the Untrusted Clients, users must authenticate using 2-factor authentication.

In this scenario, which RADIUS attribute can be used as a RADIUS policy selector on the FortiAuthenticator to accomplish this goal?

Options:

A.  

Calling-Station-Id

B.  

Framed-IP-Address

C.  

Tunnel-Client-Auth-Id

D.  

Login-IP-Host

Discussion 0
Questions 19

Refer to the exhibits.

You must integrate a FortiMail and FortiSandbox Enhanced Cloud solution for a customer who is concerned about the e-mails being delayed for too long.

According to the configuration shown in the exhibits, which would be an expected behavior?

Options:

A.  

FortiMail will relay valid e-mails to the mail server as soon as it is done with other local inspections.

B.  

If an attachment is sent to the FortiSandbox while the job queue is full, the e-mail might be delayed for up to 30 minutes, then e-mail will be relayed to the mail server.

C.  

FortiMail will not wait for results but only for attachments that have been already submitted to the FortiSandbox in the last 60 minutes.

D.  

FortiMail will ignore the timeout value if content disarm and reconstruction (CDR) is enabled.

Discussion 0
Questions 20

Refer to the exhibit, which shows a multi-region SD-WAN architecture.

Given this scenario, which two statements are true? (Choose two.)

Options:

A.  

If iBGP is used, cross-regional spoke-to-hub shortcuts can be established.

B.  

If eBGP is used, ADVPN can be established for branch-to-branch traffic across regions.

C.  

If eBGP is used, ADVPN can be established only for branch-to-branch traffic within each region.

D.  

If iBGP is used, cross-regional spoke-to-hub shortcuts cannot be used.

Discussion 0
Questions 21

Refer to the exhibit, which shows diagnostic output.

A customer reports that ICMP traffic flow from 192.168.1.11 to 93.190.134.171 is not corresponding to the SD-WAN setup.

What is the problem in this scenario?

Options:

A.  

SD-WAN Rule is matching only DNS traffic.

B.  

Port1 is used because it has more available bandwidth.

C.  

Traffic is matched by policy route.

D.  

Route for the destination IP is missing in the routing table.

Discussion 0
Questions 22

Refer to the exhibit.

A customer needs to create a multi-tier MCLAG set up with the topology as shown in the exhibit.

A1/A2

B1/B2

C1/C2

Which command snippet should be applied to it, to allow active/active links in this topology?

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 23

Which two methods are supported for importing user defined Lookup Table Data into the FortiSIEM? (Choose two.)

Options:

A.  

Report

B.  

FTP

C.  

API

D.  

SCP

Discussion 0
Questions 24

Refer to the exhibit showing the history logs from a FortiMail device.

Which FortiMail email security feature can an administrator enable to treat these emails as spam?

Options:

A.  

DKIM validation in a session profile

B.  

Sender domain validation in a session profile

C.  

Impersonation analysis in an antispam profile

D.  

Soft fail SPF validation in an antispam profile

Discussion 0
Questions 25

A customer with a FortiDDoS 200F protecting their fibre optic internet connection from incoming traffic sees that all the traffic was dropped by the device even though they were not under a DoS attack. The traffic flow was restored after it was rebooted using the GUI. Which two options will prevent this situation in the future? (Choose two)

Options:

A.  

Change the Adaptive Mode.

B.  

Create an HA setup with a second FortiDDoS 200F

C.  

Move the internet connection from the SFP interfaces to the LC interfaces

D.  

Replace with a FortiDDoS 1500F

Discussion 0
Questions 26

Refer to the exhibit showing FortiGate configurations

FortiManager VM high availability (HA) is not functioning as expected after being added to an existing deployment.

The administrator finds that VRRP HA mode is selected, but primary and secondary roles are greyed out in the GUI The managed devices never show online when FMG-B becomes primary, but they will show online whenever the FMG-A becomes primary.

What change will correct HA functionality in this scenario?

Options:

A.  

Change the FortiManager IP address on the managed FortiGate to 10.3.106.65.

B.  

Make the monitored IP to match on both FortiManager devices.

C.  

Unset the primary and secondary roles in the FortiManager CLI configuration so VRRP will decide who is primary.

D.  

Change the priority of FMG-A to be numerically lower for higher preference

Discussion 0
Questions 27

A customer has FortiAP devices in three branch offices managed from a FortiGate in the HQ. Each FortiAP is connected to a dedicated management VLAN.

The customer wants the users connected to the FortiAP SSIDs to use the branch local internet connection, but each branch uses a different VLAN ID for the bridge. HQ users travel to different branches and connect to the same SSID.

Which configuration option will solve this requirement?

Options:

A.  

Set each FortiAP to a wtp-group and use set vlan-pooling wtp-group on the VAP configuration with the corresponding VLAN ID configuration for each group.

B.  

Set a FortiAuthenticator for 802.1x authentication with the Tunnel-Type attribute set to VLAN and use set dynamic-vlan enable on the VAP configuration.

C.  

Use set vlan-pooling round-robin on the VAP configuration with the corresponding vlan-pool.

D.  

Use set vlan-pooling hash on the VAP configuration with the corresponding vlan-pool.

Discussion 0
Questions 28

A FortiGate deployment contains the following configuration:

What is the result of this configuration?

Options:

A.  

Route-maps are not configurable in VDOM SERVICES

B.  

Route-maps from the Root VDOM configuration are available in VDOM SERVICES

C.  

Route-maps from VDOM SERVICES are available in all other VDOMs

D.  

Route-maps for VDOM SERVICES are excluded from HA configuration synchronization

Discussion 0
Questions 29

You have configured a Site-to-Site IPsec VPN tunnel between a FortiGate and a third-party device but notice that one of the error counters on the tunnel interface keeps increasing.

Which two configuration options can resolve this problem? (Choose two.)

Options:

A.  

Enable Forward Error Correction (FEC) on the VPN interface for egress traffic.

B.  

Adjust the MTU of the physical interface to which the IPsec tunnel is bound.

C.  

Enable DF-bit honoring in the global settings.

D.  

Adjust the MTU of the IPsec interface.

Discussion 0
Questions 30

A FortiGate must be configured to accept VoIP traffic which will include session initiation protocol (SIP) traffic. Which statement about the VoIP configuration options is correct?

Options:

A.  

Restricting SIP requests is only possible when using the SIP Session Helper.

B.  

Rate tracking of SIP requests is only possible when the application layer gateway (ALG) is set to Flow mode.

C.  

FortiOS cannot accept SIP traffic if both the SIP Session Helper and the application layer gateway (ALG) are disabled.

D.  

By default, VoIP traffic will be processed using the SIP Session Helper.

Discussion 0
Questions 31

A customer is operating a FortiWeb cluster in a high volume active-active HA group consisting of eight FortiWeb appliances. One of the secondary members is handling traffic for one specific VIP.

What will happen with the traffic if that secondary FortiWeb appliance fails?

Options:

A.  

Traffic will be redirected to the next appliance in the same traffic group.

B.  

Traffic will be redistributed by the primary appliance to the remaining secondary appliances.

C.  

Traffic will be redistributed by the primary appliance to the remaining secondary appliances that are configured to handle traffic for that specific VIP.

D.  

Traffic will be redirected to the secondary member with the least number of sessions.

Discussion 0