ExamHelpDesk

Complete list of current Q & A>>

Fortinet Network Security Expert (NSE8-812) – Quiz

1 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

1. You want to use the MTA adapter feature on FortiSandbox in an HA-
Cluster. Which statement about this solution is true?

2 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

2. You are deploying a FortiExtender (FEX) on a FortiGate-60F. The FEX
will be managed by the FortiGate. You anticipate high utilization. The
requirement is to minimize the overhead on the devicefor WAN traffic.
Which action achieves the requirement in this scenario?

3 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

3. You are responsible for recommending an adapter type for NICs on a
FortiGate VM that will run onan ESXi Hypervisor. Your recommendation
must consider performance as the main concern, cost isnot a factor.
Which adapter type for the NICs will you recommend?

4 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

4. Which feature must you enable on the BGP neighbors to accomplish this goal?

5 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

5. A retail customer with a FortiADC HA cluster load balancing five
webservers in L7 Full NAT mode isreceiving reports of users not able to
access their website during a sale event. But for clients that
were able to connect, the website works fine.
CPU usage on the FortiADC and the web servers is low, application and
database servers are still ableto handle more traffic, and the bandwidth
utilization is under 30%.
Which two options can resolve this situation? (Choose two.)

6 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

6. SD-WAN is configured on a FortiGate. You notice that when one of the
internet links has high latencythe time to resolve names using DNS from
FortiGate is very high.
You must ensure that the FortiGate DNS resolution times are as
low as possible with the leastamount of work.
What should you configure?

7 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

7. You are troubleshooting a FortiMail Cloud service integrated with Office
365 where outgoing emailsare not reaching the recipients’ mail What
are two possible reasons for this problem? (Choose two.)

8 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

8. What is the benefit of using FortiGate NAC LAN Segments?

9 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

9. Which two methods are supported for importing user defined Lookup
Table Data into the FortiSIEM?(Choose two.)

10 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

10. You must configure an environment with dual-homed servers connected
to a pair of FortiSwitch unitsusing an MCLAG.
Multicast traffic is expected in this environment, and you should ensure
unnecessary traffic is prunedfrom links that do not have a multicast
listener.

In which two ways must you configure the igmps-f lood-traffic and igmps-
flood-report settings?(Choose two.)

11 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

11. A customer with a FortiDDoS 200F protecting their fibre optic internet
connection from incoming traffic sees that all the traffic was dropped
by the device even though they were not under a DoS attack. The
traffic flow was restored after it was rebooted using the GUI. Which
two options will prevent this situation in the future? (Choose two)

12 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

12. A customer is planning on moving their secondary data center to a
cloud-based laaS. They want to place all the Oracle-based systems
Oracle Cloud, while the other systems will be on Microsoft Azurewith
ExpressRoute service to their main data center.
They have about 200 branches with two internet services as their only
WAN connections. As a security consultant you are asked to design an
architecture using Fortinet products with security,redundancy and
performance as a priority.
Which two design options are true based on these requirements? (Choose two.)

13 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

13. A remote worker requests access to an SSH server inside the network.
You deployed a ZTNA Rule totheir FortiClient. You need to follow the
security requirements to inspect this traffic.
Which two statements are true regarding the requirements? (Choose two.)

14 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

14. Which two statements are correct on a FortiGate using the FortiGuard
Outbreak Protection Service(VOS)? (Choose two.)

15 / 15

Category: Fortinet Certified Expert Cybersecurity NSE8 812

15. You are migrating the branches of a customer to FortiGate devices.
They require independent routing tables on the LAN side of the network.
After reviewing the design, you notice the firewall will have many BGP
sessions as you have two datacenters (DC) and two ISPs per DC while
each branch is using at least 10 internal segments.
Based on this scenario, what would you suggest as the more efficient
solution, considering that in the future the number of internal segments,
DCs or internet links per DC will increase?

Your score is

0%

Scroll to Top