ExamGecko
Home / Fortinet / NSE8_812 / List of questions
Ask Question

Fortinet NSE8_812 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

Review the VPN configuration shown in the exhibit.

Fortinet NSE8_812 image Question 1 63877670103141086773406

What is the Forward Error Correction behavior if the SD-WAN network traffic download is 500 Mbps and has 8% of packet loss in the environment?

1 redundant packet for every 10 base packets

1 redundant packet for every 10 base packets

3 redundant packet for every 5 base packets

3 redundant packet for every 5 base packets

2 redundant packet for every 8 base packets

2 redundant packet for every 8 base packets

3 redundant packet for every 9 base packets

3 redundant packet for every 9 base packets

Suggested answer: A
Explanation:

The FEC configuration in the exhibit specifies that if the packet loss is greater than 10%, then the FEC mapping will be 8 base packets and 2 redundant packets. The download bandwidth of 500 Mbps is not greater than 950 Mbps, so the FEC mapping is not overridden by the bandwidth setting. Therefore, the FEC behavior will be 2 redundant packets for every 8 base packets.

Here is the explanation of the FEC mappings in the exhibit:

Packet loss greater than 10%:8 base packets and 2 redundant packets.

Upload bandwidth greater than 950 Mbps:9 base packets and 3 redundant packets.

The mappings are matched from top to bottom, so the first mapping that matches the conditions will be used. In this case, the first mapping matches because the packet loss is greater than 10%. Therefore, the FEC behavior will be 2 redundant packets for every 8 base packets.

asked 15/03/2025
marco damone
44 questions

Question 2

Report Export Collapse

You are running a diagnose command continuously as traffic flows through a platform with NP6 and you obtain the following output:

Fortinet NSE8_812 image Question 2 63877670103250449278970

Given the information shown in the output, which two statements are true? (Choose two.)

Enabling bandwidth control between the ISF and the NP will change the output

Enabling bandwidth control between the ISF and the NP will change the output

The output is showing a packet descriptor queue accumulated counter

The output is showing a packet descriptor queue accumulated counter

Enable HPE shaper for the NP6 will change the output

Enable HPE shaper for the NP6 will change the output

Host-shortcut mode is enabled.

Host-shortcut mode is enabled.

There are packet drops at the XAUI.

There are packet drops at the XAUI.

Suggested answer: B, E
Explanation:

The diagnose command shown in the output is used to display information about NP6 packet descriptor queues. The output shows that there are 16 NP6 units in total, and each unit has four XAUI ports (XA0-XA3). The output also shows that there are some non-zero values in the columns PDQ ACCU (packet descriptor queue accumulated counter) and PDQ DROP (packet descriptor queue drop counter). These values indicate that there are some packet descriptor queues that have reached their maximum capacity and have dropped some packets at the XAUI ports. This could be caused by congestion or misconfiguration of the XAUI ports or the ISF (Internal Switch Fabric).

Reference: https://docs.fortinet.com/document/fortigate/7.0.0/cli-reference/19662/diagnose-np6-pdq

The output is showing a packet descriptor queue accumulated counter, which is a measure of the number of packets that have been dropped by the NP6 due to congestion. The counter will increase if there are more packets than the NP6 can handle, which can happen if the bandwidth between the ISF and the NP is not sufficient or if the HPE shaper is enabled.

The output also shows that there are packet drops at the XAUI, which is the interface between the NP6 and the FortiGate's backplane. This means that the NP6 is not able to keep up with the traffic and is dropping packets.

The other statements are not true. Host-shortcut mode is not enabled, and enabling bandwidth control between the ISF and the NP will not change the output. HPE shaper is a feature that can be enabled to improve performance, but it will not change the output of the diagnose command.

asked 15/03/2025
Jim Balkwill
51 questions

Question 3

Report Export Collapse

Which two methods are supported for importing user defined Lookup Table Data into the FortiSIEM? (Choose two.)

Report

Report

FTP

FTP

API

API

SCP

SCP

Suggested answer: A, C
Explanation:

FortiSIEM supports two methods for importing user defined Lookup Table Data:

Report:You can import lookup table data from a report. This is the most common method for importing lookup table data.

API:You can also import lookup table data using the FortiSIEM API. This is a more advanced method that allows you to import lookup table data programmatically.

FTP, SCP, and other file transfer protocols are not supported for importing lookup table data into FortiSIEM.

asked 15/03/2025
Roger Perez Espitia
41 questions

Question 4

Report Export Collapse

What is the benefit of using FortiGate NAC LAN Segments?

It provides support for multiple DHCP servers within the same VLAN.

It provides support for multiple DHCP servers within the same VLAN.

It provides physical isolation without changing the IP address of hosts.

It provides physical isolation without changing the IP address of hosts.

It provides support for IGMP snooping between hosts within the same VLAN

It provides support for IGMP snooping between hosts within the same VLAN

It allows for assignment of dynamic address objects matching NAC policy.

It allows for assignment of dynamic address objects matching NAC policy.

Suggested answer: B
Explanation:

FortiGate NAC LAN Segments are a feature that allows users to assign different VLANs to different LAN segments without changing the IP address of hosts or bouncing the switch port. This provides physical isolation while maintaining firewall sessions and avoiding DHCP issues. One benefit of using FortiGate NAC LAN Segments is that it allows for assignment of dynamic address objects matching NAC policy. This means that users can create firewall policies based on dynamic address objects that match the NAC policy criteria, such as device type, OS type, MAC address, etc. This simplifies firewall policy management and enhances security by applying different security profiles to different types of devices.

Reference: https://docs.fortinet.com/document/fortigate/7.0.0/new-features/856212/nac-lan-segments-7-0-1

https://docs.fortinet.com/document/fortigate/7.0.0/new-features/856212/nac-lan-segments-7-0-1

asked 15/03/2025
Samori Augusto
48 questions

Question 5

Report Export Collapse

You are troubleshooting a FortiMail Cloud service integrated with Office 365 where outgoing emails are not reaching the recipients' mail What are two possible reasons for this problem? (Choose two.)

The FortiMail access control rule to relay from Office 365 servers FQDN is missing.

The FortiMail access control rule to relay from Office 365 servers FQDN is missing.

The FortiMail DKIM key was not set using the Auto Generation option.

The FortiMail DKIM key was not set using the Auto Generation option.

The FortiMail access control rules to relay from Office 365 servers public IPs are missing.

The FortiMail access control rules to relay from Office 365 servers public IPs are missing.

A Mail Flow connector from the Exchange Admin Center has not been set properly to the FortiMail Cloud FQDN.

A Mail Flow connector from the Exchange Admin Center has not been set properly to the FortiMail Cloud FQDN.

Suggested answer: A, C
Explanation:

A . The FortiMail access control rule to relay from Office 365 servers FQDN is missing.

If the access control rule to relay from Office 365 servers FQDN is missing, then FortiMail will not be able to send emails to Office 365. This is because the access control rule specifies which IP addresses or domains are allowed to relay emails through FortiMail.

D . A Mail Flow connector from the Exchange Admin Center has not been set properly to the FortiMail Cloud FQDN.

If the Mail Flow connector from the Exchange Admin Center is not set properly to the FortiMail Cloud FQDN, then Office 365 will not be able to send emails to FortiMail. This is because the Mail Flow connector specifies which SMTP server is used to send emails to external recipients.

asked 15/03/2025
Saran Lertrat
31 questions

Question 6

Report Export Collapse

Refer to the exhibit.

Fortinet NSE8_812 image Question 6 63877670103344205068172

FortiManager is configured with the Jinja Script under CLI Templates shown in the exhibit.

Which two statements correctly describe the expected behavior when running this template? (Choose two.)

The Jinja template will automatically map the interface with 'WAN' role on the managed FortiGate.

The Jinja template will automatically map the interface with 'WAN' role on the managed FortiGate.

The template will work if you change the variable format to $(WAN).

The template will work if you change the variable format to $(WAN).

The template will work if you change the variable format to {{ WAN }}.

The template will work if you change the variable format to {{ WAN }}.

The administrator must first manually map the interface for each device with a meta field.

The administrator must first manually map the interface for each device with a meta field.

The template will fail because this configuration can only be applied with a CLI or TCL script.

The template will fail because this configuration can only be applied with a CLI or TCL script.

Suggested answer: D, E
Explanation:

D . The administrator must first manually map the interface for each device with a meta field.

The Jinja template in the exhibit is expecting a meta field called WAN to be set on the managed FortiGate. This meta field will specify which interface on the FortiGate should be assigned the 'WAN' role. If the meta field is not set, then the template will fail.

E . The template will fail because this configuration can only be applied with a CLI or TCL script.

The Jinja template in the exhibit is trying to configure the interface role on the managed FortiGate. This type of configuration can only be applied with a CLI or TCL script. The Jinja template will fail because it is not a valid CLI or TCL script.

asked 15/03/2025
Anthony Agbale
51 questions

Question 7

Report Export Collapse

SD-WAN is configured on a FortiGate. You notice that when one of the internet links has high latency the time to resolve names using DNS from FortiGate is very high.

You must ensure that the FortiGate DNS resolution times are as low as possible with the least amount of work.

What should you configure?

Configure local out traffic to use the outgoing interface based on SD-WAN rules with a manual defined IP associated to a loopback interface and configure an SD-WAN rule from the loopback to the DNS server.

Configure local out traffic to use the outgoing interface based on SD-WAN rules with a manual defined IP associated to a loopback interface and configure an SD-WAN rule from the loopback to the DNS server.

Configure an SD-WAN rule to the DNS server and use the FortiGate interface IPs in the source address.

Configure an SD-WAN rule to the DNS server and use the FortiGate interface IPs in the source address.

Configure two DNS servers and use DNS servers recommended by the two internet providers.

Configure two DNS servers and use DNS servers recommended by the two internet providers.

Configure local out traffic to use the outgoing interface based on SD-WAN rules with the interface IP and configure an SD-WAN rule to the DNS server.

Configure local out traffic to use the outgoing interface based on SD-WAN rules with the interface IP and configure an SD-WAN rule to the DNS server.

Suggested answer: D
Explanation:

SD-WAN is a feature that allows users to optimize network performance and reliability by using multiple WAN links and applying rules based on various criteria, such as latency, jitter, packet loss, etc. One way to ensure that the FortiGate DNS resolution times are as low as possible with the least amount of work is to configure local out traffic to use the outgoing interface based on SD-WAN rules with the interface IP and configure an SD-WAN rule to the DNS server. This means that the FortiGate will use the best WAN link available to send DNS queries to the DNS server according to the SD-WAN rule, and use its own interface IP as the source address. This avoids NAT issues and ensures optimal DNS performance.

Reference: https://docs.fortinet.com/document/fortigate/7.0.0/sd-wan/19662/sd-wan

asked 15/03/2025
john rosselot
44 questions

Question 8

Report Export Collapse

Refer to the exhibits.

Exhibit A

Fortinet NSE8_812 image Question 8 63877670104000438997071

Exhibit B

Fortinet NSE8_812 image Question 8 63877670104000438997071

Exhibit C

Fortinet NSE8_812 image Question 8 63877670104000438997071

A customer is trying to set up a VPN with a FortiGate, but they do not have a backup of the configuration. Output during a troubleshooting session is shown in the exhibits A and B and a baseline VPN configuration is shown in Exhibit C Referring to the exhibits, which configuration will restore VPN connectivity?

A)

Fortinet NSE8_812 image Question 8 63877670104000438997071

B)

Fortinet NSE8_812 image Question 8 63877670104000438997071

C)

Fortinet NSE8_812 image Question 8 63877670104000438997071

D)

Fortinet NSE8_812 image Question 8 63877670104000438997071

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: C
Explanation:

The output in Exhibit A shows that the VPN tunnel is not established because the peer IP address is incorrect. The output in Exhibit B shows that the peer IP address is 192.168.1.100, but the baseline VPN configuration in Exhibit C shows that the peer IP address should be 192.168.1.101.

To restore VPN connectivity, you need to change the peer IP address in the VPN tunnel configuration to 192.168.1.101. The correct configuration is shown below:

config vpn ipsec phase1-interface

edit 'wan'

set peer-ip 192.168.1.101

set peer-id 192.168.1.101

set dhgrp 1

set auth-mode psk

set psk SECRET_PSK

next

end

Option A is incorrect because it does not change the peer IP address. Option B is incorrect because it changes the peer IP address to 192.168.1.100, which is the incorrect IP address. Option D is incorrect because it does not include the necessary configuration for the VPN tunnel.

asked 15/03/2025
Bruno Piovan
31 questions

Question 9

Report Export Collapse

An HA topology is using the following configuration:

Fortinet NSE8_812 image Question 9 63877670104047311541672

Based on this configuration, how long will it take for a failover to be detected by the secondary cluster member?

600ms

600ms

200ms

200ms

300ms

300ms

100ms

100ms

Suggested answer: A
Explanation:

https://docs.fortinet.com/document/fortigate/7.4.0/administration-guide/489324/failover-protection

asked 15/03/2025
Tudy smith
30 questions

Question 10

Report Export Collapse

Refer to the exhibit.

Fortinet NSE8_812 image Question 10 63877670104187932975475

You have deployed a security fabric with three FortiGate devices as shown in the exhibit. FGT_2 has the following configuration:

Fortinet NSE8_812 image Question 10 63877670104187932975475

FGT_1 and FGT_3 are configured with the default setting. Which statement is true for the synchronization of fabric-objects?

Objects from the FortiGate FGT_2 will be synchronized to the upstream FortiGate.

Objects from the FortiGate FGT_2 will be synchronized to the upstream FortiGate.

Objects from the root FortiGate will only be synchronized to FGT__2.

Objects from the root FortiGate will only be synchronized to FGT__2.

Objects from the root FortiGate will not be synchronized to any downstream FortiGate.

Objects from the root FortiGate will not be synchronized to any downstream FortiGate.

Objects from the root FortiGate will only be synchronized to FGT_3.

Objects from the root FortiGate will only be synchronized to FGT_3.

Suggested answer: D
Explanation:

https://docs.fortinet.com/document/fortigate/6.4.0/new-features/520820/improvements-to-synchronizing-objects-across-the-security-fabric-6-4-4

asked 15/03/2025
Andrew Dobie
40 questions
Total 105 questions
Go to page: of 11
Search

Related questions