ExamGecko
Home Home / Fortinet / NSE8_812

Fortinet NSE8_812 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

You are operating an internal network with multiple OSPF routers on the same LAN segment. FGT_3 needs to be added to the OSPF network and has the configuration shown in the exhibit. FGT_3 is not establishing any OSPF connection.

What needs to be changed to the configuration to make sure FGT_3 will establish OSPF neighbors without affecting the DR/BDR election?

A)

B)

C)

D)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: B

Explanation:

The OSPF configuration shown in the exhibit is using the default priority value of 1 for the interface port1. This means that FGT_3 will participate in the DR/BDR election process with the other OSPF routers on the same LAN segment. However, this is not desirable because FGT_3 is a new device that needs to be added to the OSPF network without affecting the existing DR/BDR election. Therefore, to make sure FGT_3 will establish OSPF neighbors without affecting the DR/BDR election, the priority value of the interface port1 should be changed to 0. This will prevent FGT_3 from becoming a DR or BDR and allow it to form OSPF adjacencies with the current DR and BDR. Option B shows the correct configuration that changes the priority value to 0. Option A is incorrect because it does not change the priority value. Option C is incorrect because it changes the network type to point-to-point, which is not suitable for a LAN segment with multiple OSPF routers. Option D is incorrect because it changes the area ID to 0.0.0.1, which does not match the area ID of the other OSPF routers on the same LAN segment. Reference: https://docs.fortinet.com/document/fortigate/7.0.0/administrationguide/ 358640/basic-ospf-example

A retail customer with a FortiADC HA cluster load balancing five webservers in L7 Full NAT mode is receiving reports of users not able to access their website during a sale event. But for clients that were able to connect, the website works fine.

CPU usage on the FortiADC and the web servers is low, application and database servers are still able to handle more traffic, and the bandwidth utilization is under 30%.

Which two options can resolve this situation? (Choose two.)

A.
Change the persistence rule to LB_PERSIS_SSL_SESSJD.
A.
Change the persistence rule to LB_PERSIS_SSL_SESSJD.
Answers
B.
Add more web servers to the real server poof
B.
Add more web servers to the real server poof
Answers
C.
Disable SSL between the FortiADC and the web servers
C.
Disable SSL between the FortiADC and the web servers
Answers
D.
Add a connection-pool to the FortiADC virtual server
D.
Add a connection-pool to the FortiADC virtual server
Answers
Suggested answer: A, D

Explanation:

The FortiADC HA cluster is a load balancing solution that distributes traffic among multiple web servers in L7 Full NAT mode. L7 Full NAT mode means that FortiADC terminates both client and server SSL connections and performs full NAT for both source and destination IP addresses and ports.

One possible reason for users not being able to access the website during a sale event is that the persistence rule is not configured properly. Persistence rule is a feature that ensures that subsequent requests from the same client are sent to the same web server, which is important for maintaining session continuity and avoiding errors or data loss. The default persistence rule for L7 Full NAT mode is LB_PERSIS_SRC_IP, which uses the source IP address of the client as the persistence key. However, this rule may not work well if there are many clients behind a proxy or NAT device that share the same source IP address, or if there are clients that change their source IP address frequently due to roaming or switching networks. Therefore, to resolve this situation, one option is to change the persistence rule to LB_PERSIS_SSL_SESSJD, which uses the SSL session ID of the client as the persistence key. This rule can provide more accurate and reliable persistence for SSL connections than LB_PERSIS_SRC_IP. Another possible reason for users not being able to access the website during a sale event is that there are too many TCP connections being established and terminated between FortiADC and the web servers, which consumes CPU resources and causes performance degradation. Therefore, to resolve this situation, another option is to add a connection-pool to the FortiADC virtual server. Connection-pool is a feature that allows FortiADC to reuse existing TCP connections between FortiADC and the web servers, instead of creating new ones for each request.

This can reduce CPU overhead, improve response time, and increase throughput. Reference:

https://docs.fortinet.com/document/fortiadc/6.4.0/administration-guide/19662/load-balancingmethods-and-persistence https://docs.fortinet.com/document/fortiadc/6.4.0/administrationguide/ 19662/connection-pool

Refer to the CLI output:

Given the information shown in the output, which two statements are correct? (Choose two.)

A.
Geographical IP policies are enabled and evaluated after local techniques.
A.
Geographical IP policies are enabled and evaluated after local techniques.
Answers
B.
Attackers can be blocked before they target the servers behind the FortiWeb.
B.
Attackers can be blocked before they target the servers behind the FortiWeb.
Answers
C.
The IP Reputation feature has been manually updated
C.
The IP Reputation feature has been manually updated
Answers
D.
An IP address that was previously used by an attacker will always be blocked
D.
An IP address that was previously used by an attacker will always be blocked
Answers
E.
Reputation from blacklisted IP addresses from DHCP or PPPoE pools can be restored
E.
Reputation from blacklisted IP addresses from DHCP or PPPoE pools can be restored
Answers
Suggested answer: B, E

Explanation:

The CLI output shown in the exhibit indicates that FortiWeb has enabled IP Reputation feature with local techniques enabled and geographical IP policies enabled after local techniques (set geoippolicy-order after-local). IP Reputation feature is a feature that allows FortiWeb to block or allow traffic based on the reputation score of IP addresses, which reflects their past malicious activities or behaviors. Local techniques are methods that FortiWeb uses to dynamically update its own blacklist based on its own detection of attacks or violations from IP addresses (such as signature matches, rate limiting, etc.). Geographical IP policies are rules that FortiWeb uses to block or allow traffic based on the geographical location of IP addresses (such as country, region, city, etc.). Therefore, based on the output, one correct statement is that attackers can be blocked before they target the servers behind the FortiWeb. This is because FortiWeb can use IP Reputation feature to block traffic from IP addresses that have a low reputation score or belong to a blacklisted location, which prevents them from reaching the servers and launching attacks. Another correct statement is that reputation from blacklisted IP addresses from DHCP or PPPoE pools can be restored. This is because FortiWeb can use local techniques to remove IP addresses from its own blacklist if they stop sending malicious traffic for a certain period of time (set local-techniques-expire-time), which allows them to regain their reputation and access the servers. This is useful for IP addresses that are dynamically assigned by DHCP or PPPoE and may change frequently. Reference:

https://docs.fortinet.com/document/fortiweb/6.4.0/administration-guide/19662/ip-reputation

https://docs.fortinet.com/document/fortiweb/6.4.0/administration-guide/19662/geographical-ippolicies

Refer to the exhibit.

You are deploying a FortiGate 6000F. The device should be directly connected to a switch. In the future, a new hardware module providing higher speed will be installed in the switch, and the connection to the FortiGate must be moved to this higher-speed port.

You must ensure that the initial FortiGate interface connected to the switch does not affect any other port when the new module is installed and the new port speed is defined.

How should the initial connection be made?

A.
Connect the switch on any interface between ports 21 to 24
A.
Connect the switch on any interface between ports 21 to 24
Answers
B.
Connect the switch on any interface between ports 25 to 28
B.
Connect the switch on any interface between ports 25 to 28
Answers
C.
Connect the switch on any interface between ports 1 to 4
C.
Connect the switch on any interface between ports 1 to 4
Answers
D.
Connect the switch on any interface between ports 5 to 8.
D.
Connect the switch on any interface between ports 5 to 8.
Answers
Suggested answer: A

Explanation:

The FortiGate 6000F is a high-performance firewall appliance that has 28 network interfaces with different speeds and types. The device should be directly connected to a switch that will have a new hardware module providing higher speed in the future. The connection to the FortiGate must be moved to this higher-speed port without affecting any other port. Therefore, the initial connection should be made on any interface between ports 21 to 24, which are 10G SFP+ interfaces. These interfaces are independent from each other and do not share bandwidth with any other interface.

This means that moving the connection to a higher-speed port in the future will not affect any other port on the FortiGate. Option A shows the correct answer. Option B is incorrect because ports 25 to 28 are 40G QSFP+ interfaces, which share bandwidth with ports 21 to 24. Moving the connection to a higher-speed port in the future will affect the bandwidth of these ports. Option C is incorrect because ports 1 to 4 are 100G QSFP28 interfaces, which share bandwidth with ports 5 to 8 and ports 9 to 12. Moving the connection to a higher-speed port in the future will affect the bandwidth of these ports. Option D is incorrect because ports 5 to 8 are 25G SFP28 interfaces, which share bandwidth with ports 1 to 4 and ports 9 to 12. Moving the connection to a higher-speed port in the future will affect the bandwidth of these ports. Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/hardware-acceleration-guide/19662/fortigate-6000f

Which feature must you enable on the BGP neighbors to accomplish this goal?

A.
Graceful-restart
A.
Graceful-restart
Answers
B.
Deterministic-med
B.
Deterministic-med
Answers
C.
Synchronization
C.
Synchronization
Answers
D.
Soft-reconfiguration
D.
Soft-reconfiguration
Answers
Suggested answer: A

Explanation:

Graceful-restart is a feature that allows BGP neighbors to maintain their routing information during a BGP restart or failover event, without disrupting traffic forwarding or causing route flaps. Gracefulrestart works by allowing a BGP speaker (the restarting router) to notify its neighbors (the helper routers) that it is about to restart or failover, and request them to preserve their routing information and forwarding state for a certain period of time (the restart time). The helper routers then mark the routes learned from the restarting router as stale, but keep them in their routing table and continue forwarding traffic based on them until they receive an end-of-RIB marker from the restarting router or until the restart time expires. This way, graceful-restart can minimize traffic disruption and routing instability during a BGP restart or failover event. Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/cookbook/19662/bgp-graceful-restart

Refer to the exhibit, which shows a Branch1 configuration and routing table.

In the SD-WAN implicit rule, you do not want the traffic load balance for the overlay interface when all members are available.

In this scenario, which configuration change will meet this requirement?

A.
Change the load-balance-mode to source-ip-based.
A.
Change the load-balance-mode to source-ip-based.
Answers
B.
Create a new static route with the internet sdwan-zone only
B.
Create a new static route with the internet sdwan-zone only
Answers
C.
Configure the cost in each overlay member to 10.
C.
Configure the cost in each overlay member to 10.
Answers
D.
Configure the priority in each overlay member to 10.
D.
Configure the priority in each overlay member to 10.
Answers
Suggested answer: C

Explanation:

The SD-WAN implicit rule is a default rule that applies to all traffic that does not match any explicit SD-WAN rule. The SD-WAN implicit rule uses the best quality strategy, which selects the SD-WAN member with the best measured quality based on the performance SLA metrics. This means that the traffic load balance for the overlay interface will depend on the quality of each overlay member, which may vary over time. However, if the requirement is to minimize the overhead on the device for WAN traffic and avoid load balancing for the overlay interface when all members are available, one option is to configure the cost in each overlay member to 10. The cost is a parameter that can be used to influence the selection of an SD-WAN member by adding a penalty value to its quality score.

By configuring the same cost value for all overlay members, the quality score of each member will be reduced by the same amount, which will make them less preferable than the underlay members.

This way, the SD-WAN implicit rule will select the underlay members first, unless they are unavailable or out of SLA, and only use the overlay members as a backup option. Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/sd-wan/19662/sd-wan-rules

Refer to the exhibits.

An administrator has configured a FortiGate and Forti Authenticator for two-factor authentication with FortiToken push notifications for their SSL VPN login. Upon initial review of the setup, the administrator has discovered that the customers can manually type in their two-factor code and authenticate but push notifications do not work Based on the information given in the exhibits, what must be done to fix this?

A.
On FG-1 port1, the ftm access protocol must be enabled.
A.
On FG-1 port1, the ftm access protocol must be enabled.
Answers
B.
FAC-1 must have an internet routable IP address for push notifications.
B.
FAC-1 must have an internet routable IP address for push notifications.
Answers
C.
On FG-1 CLI, the ftm-push server setting must point to 100.64.141.
C.
On FG-1 CLI, the ftm-push server setting must point to 100.64.141.
Answers
D.
On FAC-1, the FortiToken public IP setting must point to 100.64.1 41
D.
On FAC-1, the FortiToken public IP setting must point to 100.64.1 41
Answers
Suggested answer: C

Explanation:

The FortiGate and Forti Authenticator configuration shown in the exhibits is using two-factor authentication with FortiToken push notifications for SSL VPN login. FortiToken push notifications are a feature that allows users to receive a notification on their mobile devices when they attempt to log in to a FortiGate or FortiAuthenticator service, and approve or deny the login request with a single tap. However, push notifications do not work in this scenario, even though users can manually type in their two-factor code and authenticate. One possible reason for this issue is that the FortiGate does not know how to reach the FortiAuthenticator server for push notifications. Therefore, to fix this issue, one option is to configure the ftm-push server setting on FG-1 CLI, which specifies the IP address or FQDN of the FortiAuthenticator server that handles push notifications. In this case, since FAC-1 has an IP address of 100.64.141, the ftm-push server setting on FG-1 CLI must point to 100.64.141 as well. Reference:

https://docs.fortinet.com/document/fortiauthenticator/6.4.0/administrationguide/ 19662/fortitoken-mobile-push-notifications

Refer to the exhibit.

A customer has deployed a FortiGate 300E with virtual domains (VDOMs) enabled in the multi-VDOM mode. There are three VDOMs: Root is for management and internet access, while VDOM 1 and VDOM 2 are used for segregating internal traffic. AccountVInk and SalesVInk are standard VDOM links in Ethernet mode.

Given the exhibit, which two statements below about VDOM behavior are correct? (Choose two.)

A.
You can apply OSPF routing on the VDOM link in either PPP or Ethernet mode
A.
You can apply OSPF routing on the VDOM link in either PPP or Ethernet mode
Answers
B.
Traffic on AccountVInk and SalesVInk will not be accelerated.
B.
Traffic on AccountVInk and SalesVInk will not be accelerated.
Answers
C.
The VDOM links are in Ethernet mode because they have IP addressed assigned on both sides.
C.
The VDOM links are in Ethernet mode because they have IP addressed assigned on both sides.
Answers
D.
Root VDOM is an Admin type VDOM, while VDOM 1 and VDOM 2 are Traffic type VDOMs.
D.
Root VDOM is an Admin type VDOM, while VDOM 1 and VDOM 2 are Traffic type VDOMs.
Answers
E.
OSPF routing can be configured between VDOM 1 and Root VDOM without any configuration changes to AccountVInk
E.
OSPF routing can be configured between VDOM 1 and Root VDOM without any configuration changes to AccountVInk
Answers
Suggested answer: B, D

Explanation:

The FortiGate configuration shown in the exhibit is using virtual domains (VDOMs) enabled in multi-VDOM mode. There are three VDOMs: Root is for management and internet access, while VDOM 1 and VDOM 2 are used for segregating internal traffic. AccountVInk and SalesVInk are standard VDOM links in Ethernet mode. One correct statement about VDOM behavior is that traffic on AccountVInk and SalesVInk will not be accelerated. This is because standard VDOM links do not support hardware acceleration features such as NP6 or CP9 offloading, which can improve performance and throughput for traffic between VDOMs. To enable hardware acceleration for inter-VDOM traffic, non-standard VDOM links such as NP6 or CP9 interfaces should be used instead of standard VDOM links. Another correct statement about VDOM behavior is that Root VDOM is an Admin type VDOM, while VDOM 1 and VDOM 2 are Traffic type VDOMs. This is because Admin type VDOMs are special VDOMs that can only be used for management purposes and cannot process any traffic other than management traffic (such as SSH, HTTPS, SNMP, etc.). Traffic type VDOMs are normal VDOMs that can process any kind of traffic (such as firewall policies, VPN tunnels, routing protocols, etc.). By default, Root VDOM is an Admin type VDOM that can manage other Traffic type VDOMs, unless it is converted to a Traffic type VDOM by using the set vdom-admin enable command. Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/administration-guide/19662/virtual-domains

https://docs.fortinet.com/document/fortigate/7.0.0/hardware-acceleration-guide/19662/vdom-links

You are responsible for recommending an adapter type for NICs on a FortiGate VM that will run on an ESXi Hypervisor. Your recommendation must consider performance as the main concern, cost is not a factor. Which adapter type for the NICs will you recommend?

A.
Native ESXi Networking with E1000
A.
Native ESXi Networking with E1000
Answers
B.
Virtual Function (VF) PCI Passthrough
B.
Virtual Function (VF) PCI Passthrough
Answers
C.
Native ESXi Networking with VMXNET3
C.
Native ESXi Networking with VMXNET3
Answers
D.
Physical Function (PF) PCI Passthrough
D.
Physical Function (PF) PCI Passthrough
Answers
Suggested answer: C

Explanation:

The FortiGate VM is a virtual firewall appliance that can run on various hypervisors, such as ESXi, Hyper-V, KVM, etc. The adapter type for NICs on a FortiGate VM determines the performance and compatibility of the network interface cards with the hypervisor and the physical network. There are different adapter types available for NICs on a FortiGate VM, such as E1000, VMXNET3, SR-IOV, etc. If performance is the main concern and cost is not a factor, one option is to use native ESXi networking with VMXNET3 adapter type for NICs on a FortiGate VM that will run on an ESXi hypervisor.

VMXNET3 is a paravirtualized network interface card that is optimized for performance in virtual machines and supports features such as multiqueue support, Receive Side Scaling (RSS), Large Receive Offload (LRO), IPv6 offloads, and MSI/MSI-X interrupt delivery. Native ESXi networking means that the FortiGate VM uses the standard virtual switch (vSwitch) or distributed virtual switch (dvSwitch) provided by the ESXi hypervisor to connect to the physical network. This option can provide high performance and compatibility for NICs on a FortiGate VM without requiring additional hardware or software components. Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/vm-installation-for-vmwareesxi/ 19662/installing-fortigate-vm-on-vmware-esxi

https://docs.fortinet.com/document/fortigate/7.0.0/vm-installation-for-vmwareesxi/ 19662/networking

You are deploying a FortiExtender (FEX) on a FortiGate-60F. The FEX will be managed by the

FortiGate. You anticipate high utilization. The requirement is to minimize the overhead on the device for WAN traffic.

Which action achieves the requirement in this scenario?

A.
Add a switch between the FortiGate and FEX.
A.
Add a switch between the FortiGate and FEX.
Answers
B.
Enable CAPWAP connectivity between the FortiGate and the FortiExtender.
B.
Enable CAPWAP connectivity between the FortiGate and the FortiExtender.
Answers
C.
Change connectivity between the FortiGate and the FortiExtender to use VLAN Mode
C.
Change connectivity between the FortiGate and the FortiExtender to use VLAN Mode
Answers
D.
Add a VLAN under the FEX-WAN interface on the FortiGate.
D.
Add a VLAN under the FEX-WAN interface on the FortiGate.
Answers
Suggested answer: B

Explanation:

The FortiExtender (FEX) is a device that provides wireless WAN connectivity for FortiGate devices by using 3G/4G/LTE cellular networks. The FEX can be managed by the FortiGate device that it connects to, or by a FortiManager device in a centralized management scenario. The FEX can use either Ethernet or CAPWAP connectivity to communicate with the FortiGate device. Ethernet connectivity means that the FEX uses a standard Ethernet connection to send and receive data packets from the FortiGate device. CAPWAP connectivity means that the FEX uses a Control And Provisioning of Wireless Access Points (CAPWAP) tunnel to encapsulate data packets and send them over an IP network to the FortiGate device. If the requirement is to minimize the overhead on the device for WAN traffic, one option is to enable CAPWAP connectivity between the FortiGate and the FEX. This option can reduce the overhead on the device by offloading some of the processing tasks from the CPU to the NP6 processor, which can handle CAPWAP traffic more efficiently than Ethernet traffic.

This option can also provide more flexibility and scalability for WAN traffic by allowing multiple FEX devices to connect to a single FortiGate device over an IP network. Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/cookbook/19662/configuring-fortigate-withfortiextender

https://docs.fortinet.com/document/fortigate/7.0.0/cookbook/19662/capwapconnectivity

Total 60 questions
Go to page: of 6