ExamGecko
Home Home / Fortinet / NSE8_812

Fortinet NSE8_812 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Review the VPN configuration shown in the exhibit.

What is the Forward Error Correction behavior if the SD-WAN network traffic download is 500 Mbps and has 8% of packet loss in the environment?

A.
1 redundant packet for every 10 base packets
A.
1 redundant packet for every 10 base packets
Answers
B.
3 redundant packet for every 5 base packets
B.
3 redundant packet for every 5 base packets
Answers
C.
2 redundant packet for every 8 base packets
C.
2 redundant packet for every 8 base packets
Answers
D.
3 redundant packet for every 9 base packets
D.
3 redundant packet for every 9 base packets
Answers
Suggested answer: B

Explanation:

Forward Error Correction (FEC) is a feature that can improve the quality of SD-WAN network traffic by adding redundant packets to the original packets. The ratio of redundant packets to base packets is determined by the FEC mode, which can be set to low, medium, or high. In low mode, the ratio is 1:10, in medium mode, the ratio is 2:8, and in high mode, the ratio is 3:5. The FEC mode can be configured manually or automatically based on the bandwidth and packet loss of the network. In this case, since the download bandwidth is 500 Mbps and the packet loss is 8%, the FEC mode is automatically set to high, which means that 3 redundant packets are added for every 5 base packets.

Reference: https://docs.fortinet.com/document/fortigate/7.0.0/sd-wan/19662/forward-errorcorrection-fec

You are running a diagnose command continuously as traffic flows through a platform with NP6 and you obtain the following output:

Given the information shown in the output, which two statements are true? (Choose two.)

A.
Enabling bandwidth control between the ISF and the NP will change the output
A.
Enabling bandwidth control between the ISF and the NP will change the output
Answers
B.
The output is showing a packet descriptor queue accumulated counter
B.
The output is showing a packet descriptor queue accumulated counter
Answers
C.
Enable HPE shaper for the NP6 will change the output
C.
Enable HPE shaper for the NP6 will change the output
Answers
D.
Host-shortcut mode is enabled.
D.
Host-shortcut mode is enabled.
Answers
E.
There are packet drops at the XAUI.
E.
There are packet drops at the XAUI.
Answers
Suggested answer: B, E

Explanation:

The diagnose command shown in the output is used to display information about NP6 packet descriptor queues. The output shows that there are 16 NP6 units in total, and each unit has four XAUI ports (XA0-XA3). The output also shows that there are some non-zero values in the columns PDQ ACCU (packet descriptor queue accumulated counter) and PDQ DROP (packet descriptor queue drop counter). These values indicate that there are some packet descriptor queues that have reached their maximum capacity and have dropped some packets at the XAUI ports. This could be caused by congestion or misconfiguration of the XAUI ports or the ISF (Internal Switch Fabric). Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/cli-reference/19662/diagnose-np6-pdq

Which two methods are supported for importing user defined Lookup Table Data into the FortiSIEM?

(Choose two.)

A.
Report
A.
Report
Answers
B.
FTP
B.
FTP
Answers
C.
API
C.
API
Answers
D.
SCP
D.
SCP
Answers
Suggested answer: B, C

Explanation:

User defined Lookup Table Data (LTD) is a feature that allows users to import custom data into FortiSIEM for correlation, reporting, and analysis purposes. Users can create LTD files in CSV format and import them into FortiSIEM using two methods: FTP or API. FTP is a file transfer protocol that allows users to upload LTD files to a designated folder on the FortiSIEM server. API is an application programming interface that allows users to send HTTP requests to upload LTD files to FortiSIEM using RESTful web services. Reference:

https://docs.fortinet.com/document/fortisiem/6.4.0/administration-guide/19662/user-definedlookup-table-data

What is the benefit of using FortiGate NAC LAN Segments?

A.
It provides support for multiple DHCP servers within the same VLAN.
A.
It provides support for multiple DHCP servers within the same VLAN.
Answers
B.
It provides physical isolation without changing the IP address of hosts.
B.
It provides physical isolation without changing the IP address of hosts.
Answers
C.
It provides support for IGMP snooping between hosts within the same VLAN
C.
It provides support for IGMP snooping between hosts within the same VLAN
Answers
D.
It allows for assignment of dynamic address objects matching NAC policy.
D.
It allows for assignment of dynamic address objects matching NAC policy.
Answers
Suggested answer: D

Explanation:

FortiGate NAC LAN Segments are a feature that allows users to assign different VLANs to different LAN segments without changing the IP address of hosts or bouncing the switch port. This provides physical isolation while maintaining firewall sessions and avoiding DHCP issues. One benefit of using FortiGate NAC LAN Segments is that it allows for assignment of dynamic address objects matching NAC policy. This means that users can create firewall policies based on dynamic address objects that match the NAC policy criteria, such as device type, OS type, MAC address, etc. This simplifies firewall policy management and enhances security by applying different security profiles to different types of devices. Reference: https://docs.fortinet.com/document/fortigate/7.0.0/new-features/856212/naclan-segments-7-0-1

You are troubleshooting a FortiMail Cloud service integrated with Office 365 where outgoing emails are not reaching the recipients' mail What are two possible reasons for this problem? (Choose two.)

A.
The FortiMail access control rule to relay from Office 365 servers FQDN is missing.
A.
The FortiMail access control rule to relay from Office 365 servers FQDN is missing.
Answers
B.
The FortiMail DKIM key was not set using the Auto Generation option.
B.
The FortiMail DKIM key was not set using the Auto Generation option.
Answers
C.
The FortiMail access control rules to relay from Office 365 servers public IPs are missing.
C.
The FortiMail access control rules to relay from Office 365 servers public IPs are missing.
Answers
D.
A Mail Flow connector from the Exchange Admin Center has not been set properly to the FortiMail Cloud FQDN.
D.
A Mail Flow connector from the Exchange Admin Center has not been set properly to the FortiMail Cloud FQDN.
Answers
Suggested answer: C, D

Explanation:

FortiMail Cloud service is a cloud-based email security solution that integrates with Office 365 to provide protection against spam, malware, phishing, data loss, etc. To use FortiMail Cloud service with Office 365, users need to configure both FortiMail Cloud settings and Office 365 settings properly. One possible reason for outgoing emails not reaching the recipients' mailboxes is that the FortiMail access control rules to relay from Office 365 servers public IPs are missing. This means that FortiMail Cloud service does not recognize the Office 365 servers as authorized senders and rejects the outgoing emails. Users need to add the Office 365 servers public IPs to the FortiMail access control rules to allow relaying. Another possible reason for outgoing emails not reaching the recipients' mailboxes is that a Mail Flow connector from the Exchange Admin Center has not been set properly to the FortiMail Cloud FQDN. This means that Office 365 does not route the outgoing emails to the FortiMail Cloud service for scanning and delivery. Users need to create a Mail Flow connector from the Exchange Admin Center and specify the FortiMail Cloud FQDN as the smart host.

Reference: https://docs.fortinet.com/document/fortimail-cloud/6.4.0/administrationguide/ 19662/integrating-fortimail-cloud-with-office-365

Refer to the exhibit.

FortiManager is configured with the Jinja Script under CLI Templates shown in the exhibit.

Which two statements correctly describe the expected behavior when running this template?

(Choose two.)

A.
The Jinja template will automatically map the interface with "WAN" role on the managed FortiGate.
A.
The Jinja template will automatically map the interface with "WAN" role on the managed FortiGate.
Answers
B.
The template will work if you change the variable format to $(WAN).
B.
The template will work if you change the variable format to $(WAN).
Answers
C.
The template will work if you change the variable format to {{ WAN }}.
C.
The template will work if you change the variable format to {{ WAN }}.
Answers
D.
The administrator must first manually map the interface for each device with a meta field.
D.
The administrator must first manually map the interface for each device with a meta field.
Answers
E.
The template will fail because this configuration can only be applied with a CLI or TCL script.
E.
The template will fail because this configuration can only be applied with a CLI or TCL script.
Answers
Suggested answer: C, D

Explanation:

The Jinja template will not automatically map the interface with "WAN" role on the managed FortiGate. The administrator must first manually map the interface for each device with a meta field.

The template will work if you change the variable format to {{ WAN }}. The {{ }} syntax is used to define a variable in a Jinja template.

SD-WAN is configured on a FortiGate. You notice that when one of the internet links has high latency the time to resolve names using DNS from FortiGate is very high.

You must ensure that the FortiGate DNS resolution times are as low as possible with the least amount of work.

What should you configure?

A.
Configure local out traffic to use the outgoing interface based on SD-WAN rules with a manual defined IP associated to a loopback interface and configure an SD-WAN rule from the loopback to the DNS server.
A.
Configure local out traffic to use the outgoing interface based on SD-WAN rules with a manual defined IP associated to a loopback interface and configure an SD-WAN rule from the loopback to the DNS server.
Answers
B.
Configure an SD-WAN rule to the DNS server and use the FortiGate interface IPs in the source address.
B.
Configure an SD-WAN rule to the DNS server and use the FortiGate interface IPs in the source address.
Answers
C.
Configure two DNS servers and use DNS servers recommended by the two internet providers.
C.
Configure two DNS servers and use DNS servers recommended by the two internet providers.
Answers
D.
Configure local out traffic to use the outgoing interface based on SD-WAN rules with the interface IP and configure an SD-WAN rule to the DNS server.
D.
Configure local out traffic to use the outgoing interface based on SD-WAN rules with the interface IP and configure an SD-WAN rule to the DNS server.
Answers
Suggested answer: D

Explanation:

SD-WAN is a feature that allows users to optimize network performance and reliability by using multiple WAN links and applying rules based on various criteria, such as latency, jitter, packet loss, etc. One way to ensure that the FortiGate DNS resolution times are as low as possible with the least amount of work is to configure local out traffic to use the outgoing interface based on SD-WAN rules with the interface IP and configure an SD-WAN rule to the DNS server. This means that the FortiGate will use the best WAN link available to send DNS queries to the DNS server according to the SD-WAN rule, and use its own interface IP as the source address. This avoids NAT issues and ensures optimal DNS performance. Reference: https://docs.fortinet.com/document/fortigate/7.0.0/sdwan/ 19662/sd-wan

Refer to the exhibits.

Exhibit A

Exhibit B

Exhibit C

A customer is trying to set up a VPN with a FortiGate, but they do not have a backup of the configuration. Output during a troubleshooting session is shown in the exhibits A and B and a baseline VPN configuration is shown in Exhibit C Referring to the exhibits, which configuration will restore VPN connectivity?

A)

B)

C)

D)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: B

Explanation:

The VPN configuration shown in Exhibit C is a baseline VPN configuration that uses IKEv2 with preshared keys and AES256 encryption for both IKE and ESP phases. However, this configuration does not match the output shown in Exhibit A and B, which indicate that IKEv1 is used with RSA signatures and AES128 encryption for both IKE and ESP phases. Therefore, to restore VPN connectivity, the configuration needs to be modified to match these parameters. Option B shows the correct configuration that matches these parameters. Option A is incorrect because it still uses IKEv2 instead of IKEv1. Option C is incorrect because it still uses pre-shared keys instead of RSA signatures. Option D is incorrect because it still uses AES256 encryption instead of AES128 encryption. Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/cookbook/19662/ipsec-vpn-with-forticlient

An HA topology is using the following configuration:

Based on this configuration, how long will it take for a failover to be detected by the secondary cluster member?

A.
600ms
A.
600ms
Answers
B.
200ms
B.
200ms
Answers
C.
300ms
C.
300ms
Answers
D.
100ms
D.
100ms
Answers
Suggested answer: C

Explanation:

The HA topology shown in the exhibit is using link monitoring with two heartbeat interfaces (port3 and port5) and a heartbeat interval of 100ms. Link monitoring is a feature that allows HA failover to occur when one or more monitored interfaces fail or become disconnected. The heartbeat interval is the time between each heartbeat packet sent by an HA cluster unit to other cluster units through heartbeat interfaces. The failover time is determined by multiplying the heartbeat interval by three (the default deadtime value). Therefore, in this case, the failover time is 100ms x 3 = 300ms.

Reference: https://docs.fortinet.com/document/fortigate/7.0.0/administration-guide/647723/linkmonitoring-and-ha-failover-time

Refer to the exhibit.

You have deployed a security fabric with three FortiGate devices as shown in the exhibit. FGT_2 has the following configuration:

FGT_1 and FGT_3 are configured with the default setting. Which statement is true for the synchronization of fabric-objects?

A.
Objects from the FortiGate FGT_2 will be synchronized to the upstream FortiGate.
A.
Objects from the FortiGate FGT_2 will be synchronized to the upstream FortiGate.
Answers
B.
Objects from the root FortiGate will only be synchronized to FGT__2.
B.
Objects from the root FortiGate will only be synchronized to FGT__2.
Answers
C.
Objects from the root FortiGate will not be synchronized to any downstream FortiGate.
C.
Objects from the root FortiGate will not be synchronized to any downstream FortiGate.
Answers
D.
Objects from the root FortiGate will only be synchronized to FGT_3.
D.
Objects from the root FortiGate will only be synchronized to FGT_3.
Answers
Suggested answer: A

Explanation:

The security fabric shown in the exhibit consists of three FortiGate devices connected in a hierarchical topology, where FGT_1 is the root device, FGT_2 is a downstream device, and FGT_3 is a downstream device of FGT_2. FGT_2 has a configuration setting that enables fabric-object synchronization for all objects except firewall policies and firewall policy packages (set sync-fabricobjects enable). Fabric-object synchronization is a feature that allows downstream devices to synchronize their objects (such as addresses, services, schedules, etc.) with their upstream devices in a security fabric. This simplifies object management and ensures consistency across devices.

Therefore, in this case, objects from FGT_2 will be synchronized to FGT_1 (the upstream device), but not to FGT_3 (the downstream device). Objects from FGT_1 will not be synchronized to any downstream device because the default setting for fabric-object synchronization is disabled. Objects from FGT_3 will not be synchronized to any device because it does not have fabric-object synchronization enabled. Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/administration-guide/19662/fabric-objectsynchronization

Total 60 questions
Go to page: of 6