ExamGecko
Home / Fortinet / NSE8_812 / List of questions
Ask Question

Fortinet NSE8_812 Practice Test - Questions Answers, Page 6

List of questions

Question 51

Report Export Collapse

Refer to the exhibit showing a firewall policy configuration.

Fortinet NSE8_812 image Question 21 63877670142862908868662

To prevent unauthorized access of their cloud assets, an administrator wants to enforce authentication on firewall policy ID 1.

What change does the administrator need to make?

Fortinet NSE8_812 image Question 21 63877670142862908868662

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: A
Explanation:

https://docs.fortinet.com/document/fortigate/6.2.0/new-features/238665/authentication-policy-extensions

asked 15/03/2025
David Romano
33 questions

Question 52

Report Export Collapse

Refer to the exhibit.

Fortinet NSE8_812 image Question 22 63877670143019155118828

A customer wants FortiClient EMS configured to deploy to 1500 endpoints. The deployment will be integrated with FortiOS and there is an Active Directory server.

Given the configuration shown in the exhibit, which two statements about the installation are correct? (Choose two.)

If no client update time is specified on EMS, the user will be able to choose the time of installation if they wish to delay.

If no client update time is specified on EMS, the user will be able to choose the time of installation if they wish to delay.

A client can be eligible for multiple enabled configurations on the EMS server, and one will be chosen based on first priority

A client can be eligible for multiple enabled configurations on the EMS server, and one will be chosen based on first priority

You can only deploy initial installations to Windows clients.

You can only deploy initial installations to Windows clients.

You must use Standard or Enterprise SQL Server rather than the included SQL Server Express

You must use Standard or Enterprise SQL Server rather than the included SQL Server Express

The Windows clients only require 'File and Printer Sharing0 allowed and the rest is handled by Active Directory group policy

The Windows clients only require 'File and Printer Sharing0 allowed and the rest is handled by Active Directory group policy

Suggested answer: B, C
Explanation:

Ais correct because if no client update time is specified on EMS, the user will be able to choose the time of installation if they wish to delay. This is because the FortiClient EMS server will not force the installation on the client.

Eis correct because the Windows clients only require 'File and Printer Sharing' allowed and the rest is handled by Active Directory group policy. This is because the Active Directory group policy will configure the Windows clients to automatically install FortiClient and the FortiClient EMS server will only need to push the initial configuration to the clients.

The other options are incorrect. Option B is incorrect because a client can only be eligible for one enabled configuration on the EMS server. Option C is incorrect because you can deploy initial installations to both Windows and macOS clients. Option D is incorrect because you can use the included SQL Server Express to deploy FortiClient EMS.

Deploying FortiClient EMS | FortiClient / FortiOS 7.4.0 - Fortinet Document Library

Configuring FortiClient EMS | FortiClient / FortiOS 7.4.0 - Fortinet Document Library

FortiClient EMS installation requirements | FortiClient / FortiOS 7.4.0 - Fortinet Document Library

https://docs.fortinet.com/document/forticlient/7.0.7/ems-administration-guide/278884/deployment-installers https://docs.fortinet.com/document/forticlient/7.0.7/ems-administration-guide/374506/deploying-forticlient-software-to-endpoints

asked 15/03/2025
Jose M Rivera Vega
41 questions

Question 53

Report Export Collapse

Refer to the exhibit showing FortiGate configurations

Fortinet NSE8_812 image Question 23 6387767014311290248030

FortiManager VM high availability (HA) is not functioning as expected after being added to an existing deployment.

The administrator finds that VRRP HA mode is selected, but primary and secondary roles are greyed out in the GUI The managed devices never show online when FMG-B becomes primary, but they will show online whenever the FMG-A becomes primary.

What change will correct HA functionality in this scenario?

Change the FortiManager IP address on the managed FortiGate to 10.3.106.65.

Change the FortiManager IP address on the managed FortiGate to 10.3.106.65.

Make the monitored IP to match on both FortiManager devices.

Make the monitored IP to match on both FortiManager devices.

Unset the primary and secondary roles in the FortiManager CLI configuration so VRRP will decide who is primary.

Unset the primary and secondary roles in the FortiManager CLI configuration so VRRP will decide who is primary.

Change the priority of FMG-A to be numerically lower for higher preference

Change the priority of FMG-A to be numerically lower for higher preference

Suggested answer: A
Explanation:

https://community.fortinet.com/t5/FortiManager/Technical-Tip-FortiManager-VRRP-HA-configuration-in-Azure-Public/ta-p/267503 https://community.fortinet.com/t5/FortiManager/Technical-Tip-FortiManager-HA-setup-and-troubleshooting/ta-p/222998

asked 15/03/2025
VIVEKANANDAN BALARAMAN
44 questions

Question 54

Report Export Collapse

A remote IT Team is in the process of deploying a FortiGate in their lab. The closed environment has been configured to support zero-touch provisioning from the FortiManager, on the same network, via DHCP options. After waiting 15 minutes, they are reporting that the FortiGate received an IP address, but the zero-touch process failed.

The exhibit below shows what the IT Team provided while troubleshooting this issue:

Fortinet NSE8_812 image Question 24 63877670143128527072149

Which statement explains why the FortiGate did not install its configuration from the FortiManager?

The FortiGate was not configured with the correct pre-shared key to connect to the FortiManager

The FortiGate was not configured with the correct pre-shared key to connect to the FortiManager

The DHCP server was not configured with the FQDN of the FortiManager

The DHCP server was not configured with the FQDN of the FortiManager

The DHCP server used the incorrect option type for the FortiManager IP address.

The DHCP server used the incorrect option type for the FortiManager IP address.

The configuration was modified on the FortiGate prior to connecting to the FortiManager

The configuration was modified on the FortiGate prior to connecting to the FortiManager

Suggested answer: D
Explanation:

https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-perform-zero-touch-provisioning-with/ta-p/197623

asked 15/03/2025
Ariel Acosta
44 questions

Question 55

Report Export Collapse

Refer to the exhibit.

Fortinet NSE8_812 image Question 25 63877670143347271383277

A FortiWeb appliance is configured for load balancing web sessions to internal web servers. The Server Pool is configured as shown in the exhibit.

How will the sessions be load balanced between server 1 and server 2 during normal operation?

Server 1 will receive 25% of the sessions, Server 2 will receive 75% of the sessions

Server 1 will receive 25% of the sessions, Server 2 will receive 75% of the sessions

Server 1 will receive 20% of the sessions, Server 2 will receive 66.6% of the sessions

Server 1 will receive 20% of the sessions, Server 2 will receive 66.6% of the sessions

Server 1 will receive 33.3% of the sessions, Server 2 will receive 66 6% of the sessions

Server 1 will receive 33.3% of the sessions, Server 2 will receive 66 6% of the sessions

Server 1 will receive 0% of the sessions Server 2 will receive 100% of the sessions

Server 1 will receive 0% of the sessions Server 2 will receive 100% of the sessions

Suggested answer: D
asked 15/03/2025
Spandana Gangavaram
37 questions

Question 56

Report Export Collapse

Refer to the exhibit, which shows a VPN topology.

Fortinet NSE8_812 image Question 26 63877670143409769791997

The device IP 10.1.100.40 downloads a file from the FTP server IP 192.168.4.50

Referring to the exhibit, what will be the traffic flow behavior if ADVPN is configured in this environment?

All the session traffic will pass through the Hub

All the session traffic will pass through the Hub

The TCP port 21 must be allowed on the NAT Device2

The TCP port 21 must be allowed on the NAT Device2

ADVPN is not supported when spokes are behind NAT

ADVPN is not supported when spokes are behind NAT

Spoke1 will establish an ADVPN shortcut to Spoke2

Spoke1 will establish an ADVPN shortcut to Spoke2

Suggested answer: D
Explanation:

D is correct because Spoke1 will establish an ADVPN shortcut to Spoke2 when it detects that there is a demand for traffic between them. This is explained in the Fortinet Community article on Technical Tip: Fortinet Auto Discovery VPN (ADVPN) under Summary - ADVPN sequence of events.

Reference: https://community.fortinet.com/t5/FortiGate/Technical-Tip-Fortinet-Auto-Discovery-VPN-ADVPN/ta-p/195698

asked 15/03/2025
Andre Passos
44 questions

Question 57

Report Export Collapse

Refer to the exhibits.

Fortinet NSE8_812 image Question 27 63877670143847258262011

A customer has deployed a FortiGate with iBGP and eBGP routing enabled. HQ is receiving routes over eBGP from ISP 2; however, only certain routes are showing up in the routing table-Assume that BGP is working perfectly and that the only possible modifications to the routing table are solely due to the prefix list that is applied on HQ.

Given the exhibits, which two routes will be active in the routing table on the HQ firewall? (Choose two.)

172.16.204.128/25

172.16.204.128/25

172.16.201.96/29

172.16.201.96/29

172,620,64,27

172,620,64,27

172.16.204.64/27

172.16.204.64/27

Suggested answer: A, D
Explanation:

The prefix list in the exhibit is configured to match prefixes that are either in the 172.16.204.0/24 subnet or in the 172.62.0.0/16 subnet. The routes that match these prefixes will be active in the routing table on the HQ firewall.

The routes that match the following prefixes will not be active in the routing table:

172.16.201.96/29

172.62.0.64/27

These routes do not match the criteria set by the prefix list.

Prefix lists | FortiGate / FortiOS 7.4.0 - Fortinet Document Library

Configuring BGP | FortiGate / FortiOS 7.4.0 - Fortinet Document Library

asked 15/03/2025
Miguel Villanueva
36 questions

Question 58

Report Export Collapse

Refer to the exhibits.

The exhibits show a diagram of a requested topology and the base IPsec configuration.

A customer asks you to configure ADVPN via two internet underlays. The requirement is that you use one interface with a single IP address on DC FortiGate.

In this scenario, which feature should be implemented to achieve this requirement?

Use network-overlay id

Use network-overlay id

Change advpn2 to IKEv1

Change advpn2 to IKEv1

Use local-id

Use local-id

Use peer-id

Use peer-id

Suggested answer: A
Explanation:

A is correct because using network-overlay id allows you to configure multiple ADVPN tunnels on a single interface with a single IP address on the DC FortiGate. This is explained in the FortiGate Administration Guide under ADVPN > Configuring ADVPN > Configuring ADVPN on the hub.

Reference: https://docs.fortinet.com/document/fortigate/7.4.0/administration-guide/978793/advpn https://docs.fortinet.com/document/fortigate/7.4.0/administration-guide/978793/advpn/978794/configuring-advpn

https://community.fortinet.com/t5/FortiGate/Technical-Tip-Use-case-of-Network-Ids-with-ADVPN-shortcut/ta-p/241025

asked 15/03/2025
Sander de Beus
42 questions

Question 59

Report Export Collapse

You are creating the CLI script to be used on a new SD-WAN deployment You will have branches with a different number of internet connections and want to be sure there is no need to change the Performance SLA configuration in case more connections are added to the branch.

The current configuration is:

Fortinet NSE8_812 image Question 29 63877670143941006051213

Which configuration do you use for the Performance SLA members?

set members any

set members any

set members 0

set members 0

current configuration already fulfills the requirement

current configuration already fulfills the requirement

set members all

set members all

Suggested answer: B
Explanation:

Performance SLA | FortiGate / FortiOS 7.4.0

Configuring Performance SLA | FortiGate / FortiOS 7.4.0

asked 15/03/2025
Alvaro Peralta
33 questions

Question 60

Report Export Collapse

You must configure an environment with dual-homed servers connected to a pair of FortiSwitch units using an MCLAG.

Multicast traffic is expected in this environment, and you should ensure unnecessary traffic is pruned from links that do not have a multicast listener.

In which two ways must you configure the igmps-f lood-traffic and igmps-flood-report settings? (Choose two.)

disable on ICL trunks

disable on ICL trunks

enable on ICL trunks

enable on ICL trunks

disable on the ISL and FortiLink trunks

disable on the ISL and FortiLink trunks

enable on the ISL and FortiLink trunks

enable on the ISL and FortiLink trunks

Suggested answer: B, C
Explanation:

https://docs.fortinet.com/document/fortiswitch/7.0.8/devices-managed-by-fortios/801194/deploying-mclag-topologies

asked 15/03/2025
wasiu adio
34 questions
Total 105 questions
Go to page: of 11
Search

Related questions