Pass4itsure > Fortinet > Fortinet Network Security Expert > NSE8_812 > NSE8_812 Online Practice Questions and Answers

NSE8_812 Online Practice Questions and Answers

Questions 4

You must analyze an event that happened at 20:37 UTC. One log relevant to the event is extracted from FortiGate logs:

The devices and the administrator are all located in different time zones Daylight savings time (DST) is disabled The FortiGate is at GMT-1000. The FortiAnalyzer is at GMT-0800 Your browser local time zone is at GMT-03.00

You want to review this log on FortiAnalyzer GUI, what time should you use as a filter?

A. 20:37:08

B. 10:37:08

C. 17:37:08

D. 12.37:08

Buy Now
Questions 5

Refer to the exhibits.

The exhibits show a FortiGate network topology and the output of the status of high availability on the FortiGate. Given this information, which statement is correct?

A. The ethertype values of the HA packets are 0x8890, 0x8891, and 0x8892

B. The cluster mode can support a maximum of four (4) FortiGate VMs

C. The cluster members are on the same network and the IP addresses were statically assigned.

D. FGVMEVLQOG33WM3D and FGVMEVGCJNHFYI4A share a virtual MAC address.

Buy Now
Questions 6

A retail customer with a FortiADC HA cluster load balancing five webservers in L7 Full NAT mode is receiving reports of users not able to access their website during a sale event. But for clients that were able to connect, the website works fine.

CPU usage on the FortiADC and the web servers is low, application and database servers are still able to handle more traffic, and the bandwidth utilization is under 30%.

Which two options can resolve this situation? (Choose two.)

A. Change the persistence rule to LB_PERSIS_SSL_SESSJD.

B. Add more web servers to the real server poof

C. Disable SSL between the FortiADC and the web servers

D. Add a connection-pool to the FortiADC virtual server

Buy Now
Questions 7

Refer to the exhibit, which shows a Branch1 configuration and routing table. In the SD-WAN implicit rule, you do not want the traffic load balance for the overlay interface when all members are available.

In this scenario, which configuration change will meet this requirement?

A. Change the load-balance-mode to source-ip-based.

B. Create a new static route with the internet sdwan-zone only

C. Configure the cost in each overlay member to 10.

D. Configure the priority in each overlay member to 10.

Buy Now
Questions 8

Refer to the exhibit.

A customer wants FortiClient EMS configured to deploy to 1500 endpoints. The deployment will be integrated with FortiOS and there is an Active Directory server.

Given the configuration shown in the exhibit, which two statements about the installation are correct? (Choose two.)

A. If no client update time is specified on EMS, the user will be able to choose the time of installation if they wish to delay.

B. A client can be eligible for multiple enabled configurations on the EMS server, and one will be chosen based on first priority

C. You can only deploy initial installations to Windows clients.

D. You must use Standard or Enterprise SQL Server rather than the included SQL Server Express

E. The Windows clients only require "File and Printer Sharing0 allowed and the rest is handled by Active Directory group policy

Buy Now
Questions 9

Refer to the exhibit, which shows a VPN topology.

The device IP 10.1.100.40 downloads a file from the FTP server IP 192.168.4.50

Referring to the exhibit, what will be the traffic flow behavior if ADVPN is configured in this environment?

A. All the session traffic will pass through the Hub

B. The TCP port 21 must be allowed on the NAT Device2

C. ADVPN is not supported when spokes are behind NAT

D. Spoke1 will establish an ADVPN shortcut to Spoke2

Buy Now
Questions 10

Refer to the exhibit showing a firewall policy configuration.

To prevent unauthorized access of their cloud assets, an administrator wants to enforce authentication on firewall policy ID 1. What change does the administrator need to make?

A. Option A

B. Option B

C. Option C

D. Option D

Buy Now
Questions 11

You are running a diagnose command continuously as traffic flows through a platform with NP6 and you obtain the following output: Given the information shown in the output, which two statements are true? (Choose two.)

A. Enabling bandwidth control between the ISF and the NP will change the output

B. The output is showing a packet descriptor queue accumulated counter

C. Enable HPE shaper for the NP6 will change the output

D. Host-shortcut mode is enabled.

E. There are packet drops at the XAUI.

Buy Now
Questions 12

Refer to the exhibit.

The exhibit shows the forensics analysis of an event detected by the FortiEDR core

In this scenario, which statement is correct regarding the threat?

A. This is an exfiltration attack and has been stopped by FortiEDR.

B. This is an exfiltration attack and has not been stopped by FortiEDR

C. This is a ransomware attack and has not been stopped by FortiEDR.

D. This is a ransomware attack and has been stopped by FortiEDR

Buy Now
Questions 13

Refer to the exhibit.

FortiManager is configured with the Jinja Script under CLI Templates shown in the exhibit.

Which two statements correctly describe the expected behavior when running this template? (Choose two.)

A. The Jinja template will automatically map the interface with "WAN" role on the managed FortiGate.

B. The template will work if you change the variable format to $(WAN).

C. The template will work if you change the variable format to {{ WAN }}.

D. The administrator must first manually map the interface for each device with a meta field.

E. The template will fail because this configuration can only be applied with a CLI or TCL script.

Buy Now
Exam Code: NSE8_812
Exam Name: Network Security Expert 8 Written Exam
Last Update: May 14, 2024
Questions: 60
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99