ExamGecko
Home / Fortinet / NSE8_812 / List of questions
Ask Question

Fortinet NSE8_812 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Which two statements are correct on a FortiGate using the FortiGuard Outbreak Protection Service (VOS)? (Choose two.)

The FortiGuard VOS can be used only with proxy-base policy inspections.

The FortiGuard VOS can be used only with proxy-base policy inspections.

If third-party AV database returns a match the scanned file is deemed to be malicious.

If third-party AV database returns a match the scanned file is deemed to be malicious.

The antivirus database queries FortiGuard with the hash of a scanned file

The antivirus database queries FortiGuard with the hash of a scanned file

The AV engine scan must be enabled to use the FortiGuard VOS feature

The AV engine scan must be enabled to use the FortiGuard VOS feature

The hash signatures are obtained from the FortiGuard Global Threat Intelligence database.

The hash signatures are obtained from the FortiGuard Global Threat Intelligence database.

Suggested answer: C, E
Explanation:

C . The antivirus database queries FortiGuard with the hash of a scanned file. This is how the FortiGuard VOS service works. The FortiGate queries FortiGuard with the hash of a scanned file, and FortiGuard returns a list of known malware signatures that match the hash.

E . The hash signatures are obtained from the FortiGuard Global Threat Intelligence database. This is where the FortiGuard VOS service gets its hash signatures from. The FortiGuard Global Threat Intelligence database is updated regularly with new malware signatures.

https://docs.fortinet.com/document/fortigate/7.4.1/administration-guide/889364/fortiguard-outbreak-prevention

asked 15/03/2025
Wonseok Chung
27 questions

Question 32

Report Export Collapse

A remote worker requests access to an SSH server inside the network. You deployed a ZTNA Rule to their FortiClient. You need to follow the security requirements to inspect this traffic.

Which two statements are true regarding the requirements? (Choose two.)

FortiGate can perform SSH access proxy host-key validation.

FortiGate can perform SSH access proxy host-key validation.

You need to configure a FortiClient SSL-VPN tunnel to inspect the SSH traffic.

You need to configure a FortiClient SSL-VPN tunnel to inspect the SSH traffic.

SSH traffic is tunneled between the client and the access proxy over HTTPS

SSH traffic is tunneled between the client and the access proxy over HTTPS

Traffic is discarded as ZTNA does not support SSH connection rules

Traffic is discarded as ZTNA does not support SSH connection rules

Suggested answer: A, C
Explanation:

ZTNA supports SSH connection rules that allow remote workers to access SSH servers inside the network through an HTTPS tunnel between the client and the access proxy (FortiGate). The access proxy acts as an SSH client to connect to the real SSH server on behalf of the user, and performs host-key validation to verify the identity of the server. The user can use any SSH client that supports HTTPS proxy settings, such as PuTTY or OpenSSH.

Reference: https://docs.fortinet.com/document/fortigate/7.0.0/ztna-deployment/899992/configuring-ztna-rules-to-control-access

https://docs.fortinet.com/document/fortigate/7.4.1/administration-guide/29927/ztna-ssh-access-proxy-example

asked 15/03/2025
Nagaretnam, Ravin
45 questions

Question 33

Report Export Collapse

On a FortiGate Configured in Transparent mode, which configuration option allows you to control Multicast traffic passing through the?

Fortinet NSE8_812 image Question 3 63877670140206728624826

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: A
Explanation:

When multicast-skip-policy is enabled, no check is performed based on multicast policy. A multicast packet received on an interface is flooded unconditionally to all interfaces (except the incoming interface) belonging to the same forwarding domain. Multicast packets are forwarded even when there is no multicast policy or the multicast policy is set to deny. To forward multicast traffic based on multicast policy, multicast-skip-policy must be disabled. In transparent mode, there is a per-VDOM configuration to skip policy check and forward all multicast traffic. This command is only available in transparent mode, and is disabled by default.

asked 15/03/2025
Ray Hato
44 questions

Question 34

Report Export Collapse

Refer to the CLI configuration of an SSL inspection profile from a FortiGate device configured to protect a web server:

Fortinet NSE8_812 image Question 4 63877670140253602369427

Based on the information shown, what is the expected behavior when an HTTP/2 request comes in?

FortiGate will reject all HTTP/2 ALPN headers.

FortiGate will reject all HTTP/2 ALPN headers.

FortiGate will strip the ALPN header and forward the traffic.

FortiGate will strip the ALPN header and forward the traffic.

FortiGate will rewrite the ALPN header to request HTTP/1.

FortiGate will rewrite the ALPN header to request HTTP/1.

FortiGate will forward the traffic without modifying the ALPN header.

FortiGate will forward the traffic without modifying the ALPN header.

Suggested answer: B
Explanation:

https://docs.fortinet.com/document/fortigate/7.0.0/new-features/710924/http-2-support-in-proxy-mode-ssl-inspection

asked 15/03/2025
IllDisposed ToBTS
39 questions

Question 35

Report Export Collapse

Refer to the exhibits.

Fortinet NSE8_812 image Question 5 63877670140722340119922

Fortinet NSE8_812 image Question 5 63877670140722340119922

The exhibits show a FortiGate network topology and the output of the status of high availability on the FortiGate.

Given this information, which statement is correct?

The ethertype values of the HA packets are 0x8890, 0x8891, and 0x8892

The ethertype values of the HA packets are 0x8890, 0x8891, and 0x8892

The cluster mode can support a maximum of four (4) FortiGate VMs

The cluster mode can support a maximum of four (4) FortiGate VMs

The cluster members are on the same network and the IP addresses were statically assigned.

The cluster members are on the same network and the IP addresses were statically assigned.

FGVMEVLQOG33WM3D and FGVMEVGCJNHFYI4A share a virtual MAC address.

FGVMEVLQOG33WM3D and FGVMEVGCJNHFYI4A share a virtual MAC address.

Suggested answer: C
Explanation:

The output of the status of high availability on the FortiGate shows that the cluster mode is active-passive, which means that only one FortiGate unit is active at a time, while the other unit is in standby mode. The active unit handles all traffic and also sends HA heartbeat packets to monitor the standby unit. The standby unit becomes active if it stops receiving heartbeat packets from the active unit, or if it receives a higher priority from another cluster unit. In active-passive mode, all cluster units share a virtual MAC address for each interface, which is used as the source MAC address for all packets forwarded by the cluster.

Reference: https://docs.fortinet.com/document/fortigate/6.4.0/cookbook/103439/high-availability-with-two-fortigates

asked 15/03/2025
annalise ramdin
43 questions

Question 36

Report Export Collapse

Refer to the exhibit showing an SD-WAN configuration.

Fortinet NSE8_812 image Question 6 63877670141050456532129

According to the exhibit, if an internal user pings 10.1.100.2 and 10.1.100.22 from subnet 172.16.205.0/24, which outgoing interfaces will be used?

port16 and port1

port16 and port1

port1 and port1

port1 and port1

port16 and port15

port16 and port15

port1 and port15

port1 and port15

Suggested answer: D
Explanation:

According to the exhibit, the SD-WAN configuration has two rules: one for traffic to 10.1.100.0/24 subnet, and one for traffic to 10.1.100.16/28 subnet. The first rule uses the best quality strategy, which selects the SD-WAN member with the best measured quality based on performance SLA metrics. The second rule uses the manual strategy, which specifies port1 as the SD-WAN member to select. Therefore, if an internal user pings 10.1.100.2 and 10.1.100.22 from subnet 172.16.205.0/24, the outgoing interfaces will be port16 and port1 respectively, assuming that port16 has the best quality among the SD-WAN members.

Reference: https://docs.fortinet.com/document/fortigate/6.2.14/cookbook/218559/configuring-the-sd-wan-interface

https://docs.fortinet.com/document/fortigate/7.2.8/administration-guide/686587/ecmp-support-for-the-longest-match-in-sd-wan-rule-matching

asked 15/03/2025
Charles Smith
51 questions

Question 37

Report Export Collapse

A customer's cybersecurity department needs to implement security for the traffic between two VPCs in AWS, but these belong to different departments within the company. The company uses a single region for all their VPCs.

Which two actions will achieve this requirement while keeping separate management of each department's VPC? (Choose two.)

Create a transit VPC with a FortiGate HA cluster, connect to the other two using VPC peering, and use routing tables to force traffic through the FortiGate cluster.

Create a transit VPC with a FortiGate HA cluster, connect to the other two using VPC peering, and use routing tables to force traffic through the FortiGate cluster.

Create an 1AM account for the cybersecurity department to manage both existing VPC, create a FortiGate HA Cluster on each VPC and IPSEC VPN to force traffic between the VPCs through the FortiGate clusters

Create an 1AM account for the cybersecurity department to manage both existing VPC, create a FortiGate HA Cluster on each VPC and IPSEC VPN to force traffic between the VPCs through the FortiGate clusters

Migrate all the instances to the same VPC and create 1AM accounts for each department, then implement a new subnet for a FortiGate auto-scaling group and use routing tables to force the traffic through the FortiGate cluster.

Migrate all the instances to the same VPC and create 1AM accounts for each department, then implement a new subnet for a FortiGate auto-scaling group and use routing tables to force the traffic through the FortiGate cluster.

Create a VPC with a FortiGate auto-scaling group with a Transit Gateway attached to the three VPC to force routing through the FortiGate cluster

Create a VPC with a FortiGate auto-scaling group with a Transit Gateway attached to the three VPC to force routing through the FortiGate cluster

Suggested answer: A, D
Explanation:

To implement security for the traffic between two VPCs in AWS, while keeping separate management of each department's VPC, two possible actions are:

Create a transit VPC with a FortiGate HA cluster, connect to the other two using VPC peering, and use routing tables to force traffic through the FortiGate cluster. This option allows the cybersecurity department to manage the transit VPC and apply security policies on the FortiGate cluster, while the other departments can manage their own VPCs and instances. The VPC peering connections enable direct communication between the VPCs without using public IPs or gateways. The routing tables can be configured to direct all inter-VPC traffic to the transit VPC.

Create a VPC with a FortiGate auto-scaling group with a Transit Gateway attached to the three VPCs to force routing through the FortiGate cluster. This option also allows the cybersecurity department to manage the security VPC and apply security policies on the FortiGate cluster, while the other departments can manage their own VPCs and instances. The Transit Gateway acts as a network hub that connects multiple VPCs and on-premises networks. The routing tables can be configured to direct all inter-VPC traffic to the security VPC.

Reference: https://docs.fortinet.com/document/fortigate-public-cloud/7.2.0/aws-administration-guide/506140/connecting-a-local-fortigate-to-an-aws-vpc-vpn https://docs.fortinet.com/document/fortigate-public-cloud/7.0.0/sd-wan-architecture-for-enterprise/166334/sd-wan-configuration

asked 15/03/2025
Tiffany Peterson
44 questions

Question 38

Report Export Collapse

Refer to the exhibit containing the configuration snippets from the FortiGate. Customer requirements:

Fortinet NSE8_812 image Question 8 63877670141550443610864Fortinet NSE8_812 image Question 8 63877670141550443610864

* SSLVPN Portal must be accessible on standard HTTPS port (TCP/443)

* Public IP address (129.11.1.100) is assigned to portl

* Datacenter.acmecorp.com resolves to the public IP address assigned to portl

The customer has a Let's Encrypt certificate that is going to expire soon and it reports that subsequent attempts to renew that certificate are failing.

Reviewing the requirement and the exhibit, which configuration change below will resolve this issue?


A)

Fortinet NSE8_812 image Question 8 63877670141550443610864

B)

Fortinet NSE8_812 image Question 8 63877670141550443610864

C)

Fortinet NSE8_812 image Question 8 63877670141550443610864

D)

Fortinet NSE8_812 image Question 8 63877670141550443610864



Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: A
Explanation:

https://docs.fortinet.com/document/fortigate/7.4.1/administration-guide/822087/automatically-provision-a-certificate

asked 15/03/2025
cesar ganguie
48 questions

Question 39

Report Export Collapse

Refer to the exhibit.

Fortinet NSE8_812 image Question 9 63877670141566067927226

The exhibit shows the forensics analysis of an event detected by the FortiEDR core

In this scenario, which statement is correct regarding the threat?

This is an exfiltration attack and has been stopped by FortiEDR.

This is an exfiltration attack and has been stopped by FortiEDR.

This is an exfiltration attack and has not been stopped by FortiEDR

This is an exfiltration attack and has not been stopped by FortiEDR

This is a ransomware attack and has not been stopped by FortiEDR.

This is a ransomware attack and has not been stopped by FortiEDR.

This is a ransomware attack and has been stopped by FortiEDR

This is a ransomware attack and has been stopped by FortiEDR

Suggested answer: C
asked 15/03/2025
Gennadiy Volkov
41 questions

Question 40

Report Export Collapse

An automation stitch was configured using an incoming webhook as the trigger named 'my_incoming_webhook'. The action is configured to execute the CLI Script shown:

Fortinet NSE8_812 image Question 10 63877670141581692691345

data: '{ ''hostname'': ''bad_host_1'', ''ip'': [''1.1.1.1'']}' url: http://192.168.226.129/api/v2/monitor/system/automation-stitch/webhook/my_incoming_webhook

data: '{ ''hostname'': ''bad_host_1'', ''ip'': [''1.1.1.1'']}' url: http://192.168.226.129/api/v2/monitor/system/automation-stitch/webhook/my_incoming_webhook

data: '{ ''hostname'': ''bad_host_1'', ''ip'': ''1.1.1.1''}' url: http://192.168.226.129/api/v2/monitor/system/automation-stitch/webhook/my_incoming_webhook

data: '{ ''hostname'': ''bad_host_1'', ''ip'': ''1.1.1.1''}' url: http://192.168.226.129/api/v2/monitor/system/automation-stitch/webhook/my_incoming_webhook

data: '{ ''hostname'': ''bad_host_1'', ''ip'': [''1.1.1.1'']}' url: http://192.168.226.129/api/v2/cmdb/system/automation-stitch/webhook/my_incoming_webhook

data: '{ ''hostname'': ''bad_host_1'', ''ip'': [''1.1.1.1'']}' url: http://192.168.226.129/api/v2/cmdb/system/automation-stitch/webhook/my_incoming_webhook

data: '{ ''hostname'': ''bad_host_1'', ''ip'': ''1.1.1.1''}' url: http://192.168.226.129/api/v2/cmdb/system/automation-stitch/webhook/my_incoming_webhook

data: '{ ''hostname'': ''bad_host_1'', ''ip'': ''1.1.1.1''}' url: http://192.168.226.129/api/v2/cmdb/system/automation-stitch/webhook/my_incoming_webhook

Suggested answer: A
asked 15/03/2025
Jumar Antonia
44 questions
Total 105 questions
Go to page: of 11
Search

Related questions