Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

NSE8_812 Questions and Answers

Question # 6

Refer to the exhibits.

The exhibits show the configuration and debug output from a FortiGate Public SDN Connector.

What is a possible reason for this dynamic address object to be empty?

A.

The Application ID is incorrect.

B.

The Client secret is incorrect.

C.

The App registration does not have a role with necessary read permissions on the resource group.

D.

The resource group NSE8-Lab does not exist.

Full Access
Question # 7

Review the VPN configuration shown in the exhibit.

What is the Forward Error Correction behavior if the SD-WAN network traffic download is 500 Mbps and has 8% of packet loss in the environment?

A.

1 redundant packet for every 10 base packets

B.

3 redundant packet for every 5 base packets

C.

2 redundant packet for every 8 base packets

D.

3 redundant packet for every 9 base packets

Full Access
Question # 8

A FortiGate is configured to perform outbound firewall authentication with Azure AD as a SAML IdP.

What are two valid interactions that occur when the client attempts to access the internet? (Choose two.)

A.

FortiGate SP sends a SAML request to the IdP.

B.

The Microsoft SAML IdP sends the SAML response to the FortiGate SP.

C.

The client browser forwards the SAML response received from Microsoft SAML IdP to the FortiGate SP.

D.

FortiGate SP redirects the client browser to the local captive portal and then redirects to the Microsoft SAML IdP.

Full Access
Question # 9

Refer to The exhibit, which shows a topology diagram.

A customer wants to use SD-WAN for traffic generated from the data center towards Branches. SD-WAN on HUB should follow the underlay condition on each Branch and the solution should be scalable for hundreds of Branches.

Which SD WAN-Rules strategy should be used?

A.

Manual based on route-tags

B.

Lowest Cost SLA

C.

Auto based on link quality

D.

Best Quality based on route-tags

Full Access
Question # 10

A customer wants to use the FortiAuthenticator REST API to retrieve an SSO group called SalesGroup. The following API call is being made with the 'curl' utility:

Which two statements correctly describe the expected behavior of the FortiAuthenticator REST API? (Choose two.)

A.

Only users with the "Full permission" role can access the REST API

B.

This API call will fail because it requires that API version 2

C.

If the REST API web service access key is lost, it cannot be retrieved and must be changed.

D.

The syntax is incorrect because the API calls needs the get method.

Full Access
Question # 11

Refer to the exhibit.

The exhibit shows the topology a customer wants to implement using a flexible authentication scheme. Users connecting from trusted remote locations are authenticated using only their username/password when connecting to the SSLVPN FortiGate in the data center.

When connecting from the Untrusted Clients, users must authenticate using 2-factor authentication.

In this scenario, which RADIUS attribute can be used as a RADIUS policy selector on the FortiAuthenticator to accomplish this goal?

A.

Calling-Station-Id

B.

Framed-IP-Address

C.

Tunnel-Client-Auth-Id

D.

Login-IP-Host

Full Access
Question # 12

You deployed a fully loaded FG-7121F in the data center and enabled sslvpn-load-balance. Based on the behavior of this feature which statement is correct?

A.

You can use src-ip or dst-ip-dport on dp-load-distribution-method to make SSL VPN load balancing work as expected.

B.

If an FPM goes down, SSL VPN IP pool IP addresses will be re-allocated to the remaining FPMs.

C.

To have better traffic distribution you should use IP pools that increment in multiples of 12.

D.

Enabling SSL VPN load balancing will clear the session table.

Full Access
Question # 13

Refer to the exhibits, which show a network topology and VPN configuration.

A network administrator has been tasked with modifying the existing dial-up IPsec VPN infrastructure to detect the path quality to the remote endpoints.

After applying the configuration shown in the configuration exhibit, the VPN clients can still connect and access the protected 172.16.205.0/24 network, but no SLA information shows up for the client tunnels when issuing the diagnose sys link-monitor tunnel all command on the FortiGate CLI.

What is wrong with the configuration?

A.

SLA link monitoring does not work with the net-device setting.

B.

The admin needs to disable the mode-cfg setting.

C.

IPsec Phase1 Interface has to be configured in IPsec main mode.

D.

It is necessary to use the IKEv2 protocol in this situation.

Full Access
Question # 14

Refer to the exhibits.

A customer wants to deploy 12 FortiAP 431F devices on high density conference center, but they do not currently have any PoE switches to connect them to. They want to be able to run them at full power while having network redundancy

From the FortiSwitch models and sample retail prices shown in the exhibit, which build of materials would have the lowest cost, while fulfilling the customer's requirements?

A.

1x FortiSwitch 248EFPOE

B.

2x FortiSwitch 224E-POE

C.

2x FortiSwitch 248E-FPOE

D.

2x FortiSwitch 124E-FPOE

Full Access
Question # 15

Refer to the exhibits.

You must integrate a FortiMail and FortiSandbox Enhanced Cloud solution for a customer who is concerned about the e-mails being delayed for too long.

According to the configuration shown in the exhibits, which would be an expected behavior?

A.

FortiMail will relay valid e-mails to the mail server as soon as it is done with other local inspections.

B.

If an attachment is sent to the FortiSandbox while the job queue is full, the e-mail might be delayed for up to 30 minutes, then e-mail will be relayed to the mail server.

C.

FortiMail will not wait for results but only for attachments that have been already submitted to the FortiSandbox in the last 60 minutes.

D.

FortiMail will ignore the timeout value if content disarm and reconstruction (CDR) is enabled.

Full Access
Question # 16

Refer to the exhibit.

A customer wants to automate the creation and configuration of FortiGate VM instances in a VMware vCenter environment using Terraform. They have the creation part working with the code shown in the exhibit.

Which code snippet will allow Terraform to automatically connect to a newly deployed FortiGate if its IP was dynamically assigned by VMware NSX-T?

A.

B.

C.

D.

Full Access
Question # 17

Refer to the exhibit.

What is happening in this scenario?

A.

The user status changed at FortiClient EMS to off-net.

B.

The user is authenticating against a FortiGate Captive Portal.

C The user is authenticating against an IdP.

C.

The user has not authenticated on their external browser.

Full Access
Question # 18

Refer to the exhibit.

A customer wants FortiClient EMS configured to deploy to 1500 endpoints. The deployment will be integrated with FortiOS and there is an Active Directory server.

Given the configuration shown in the exhibit, which two statements about the installation are correct? (Choose two.)

A.

If no client update time is specified on EMS, the user will be able to choose the time of installation if they wish to delay.

B.

A client can be eligible for multiple enabled configurations on the EMS server, and one will be chosen based on first priority

C.

You can only deploy initial installations to Windows clients.

D.

You must use Standard or Enterprise SQL Server rather than the included SQL Server Express

E.

The Windows clients only require "File and Printer Sharing0 allowed and the rest is handled by Active Directory group policy

Full Access
Question # 19

A customer has FortiAP devices in three branch offices managed from a FortiGate in the HQ. Each FortiAP is connected to a dedicated management VLAN.

The customer wants the users connected to the FortiAP SSIDs to use the branch local internet connection, but each branch uses a different VLAN ID for the bridge. HQ users travel to different branches and connect to the same SSID.

Which configuration option will solve this requirement?

A.

Set each FortiAP to a wtp-group and use set vlan-pooling wtp-group on the VAP configuration with the corresponding VLAN ID configuration for each group.

B.

Set a FortiAuthenticator for 802.1x authentication with the Tunnel-Type attribute set to VLAN and use set dynamic-vlan enable on the VAP configuration.

C.

Use set vlan-pooling round-robin on the VAP configuration with the corresponding vlan-pool.

D.

Use set vlan-pooling hash on the VAP configuration with the corresponding vlan-pool.

Full Access
Question # 20

Refer to the exhibit, which shows a VPN topology.

The device IP 10.1.100.40 downloads a file from the FTP server IP 192.168.4.50

Referring to the exhibit, what will be the traffic flow behavior if ADVPN is configured in this environment?

A.

All the session traffic will pass through the Hub

B.

The TCP port 21 must be allowed on the NAT Device2

C.

ADVPN is not supported when spokes are behind NAT

D.

Spoke1 will establish an ADVPN shortcut to Spoke2

Full Access
Question # 21

Refer to the exhibits.

The exhibits show a diagram of a requested topology and the base IPsec configuration.

A customer asks you to configure ADVPN via two internet underlays. The requirement is that you use one interface with a single IP address on DC FortiGate.

In this scenario, which feature should be implemented to achieve this requirement?

A.

Use network-overlay id

B.

Change advpn2 to IKEv1

C.

Use local-id

D.

Use peer-id

Full Access
Question # 22

Refer to the exhibit, which shows a multi-region SD-WAN architecture.

Given this scenario, which two statements are true? (Choose two.)

A.

If iBGP is used, cross-regional spoke-to-hub shortcuts can be established.

B.

If eBGP is used, ADVPN can be established for branch-to-branch traffic across regions.

C.

If eBGP is used, ADVPN can be established only for branch-to-branch traffic within each region.

D.

If iBGP is used, cross-regional spoke-to-hub shortcuts cannot be used.

Full Access
Question # 23

You want to use the MTA adapter feature on FortiSandbox in an HA-Cluster. Which statement about this solution is true?

A.

The configuration of the MTA Adapter Local Interface is different than on port1.

B.

The MTA adapter is only available in the primary node.

C.

The MTA adapter mode is only detection mode.

D.

The configuration is different than on a standalone device.

Full Access
Question # 24

Which two methods are supported for importing user defined Lookup Table Data into the FortiSIEM? (Choose two.)

A.

Report

B.

FTP

C.

API

D.

SCP

Full Access
Question # 25

A FortiGate must be configured to accept VoIP traffic which will include session initiation protocol (SIP) traffic. Which statement about the VoIP configuration options is correct?

A.

Restricting SIP requests is only possible when using the SIP Session Helper.

B.

Rate tracking of SIP requests is only possible when the application layer gateway (ALG) is set to Flow mode.

C.

FortiOS cannot accept SIP traffic if both the SIP Session Helper and the application layer gateway (ALG) are disabled.

D.

By default, VoIP traffic will be processed using the SIP Session Helper.

Full Access
Question # 26

An HA topology is using the following configuration:

Based on this configuration, how long will it take for a failover to be detected by the secondary cluster member?

A.

600ms

B.

200ms

C.

300ms

D.

100ms

Full Access
Question # 27

An administrator has configured a FortiGate device to authenticate SSL VPN users using digital certificates. A FortiAuthenticator is the certificate authority (CA) and the Online Certificate Status Protocol (OCSP) server.

Part of the FortiGate configuration is shown below:

Based on this configuration, which two statements are true? (Choose two.)

A.

OCSP checks will always go to the configured FortiAuthenticator

B.

The OCSP check of the certificate can be combined with a certificate revocation list.

C.

OCSP certificate responses are never cached by the FortiGate.

D.

If the OCSP server is unreachable, authentication will succeed if the certificate matches the CA.

Full Access
Question # 28

On a FortiGate Configured in Transparent mode, which configuration option allows you to control Multicast traffic passing through the?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 29

An administrator has configured a FortiGate device to authenticate SSL VPN users using digital certificates. A FortiAuthenticator is the certificate authority (CA) and the OCSP server.

Part of the FortiGate configuration is shown below:

Based on this configuration, which authentication scenario will FortiGate deny?

A.

The user certificate does not contain the OCSP URL.

B.

FortiAuthenticator responds to an OCSP request that the user certificate authority is untrusted.

C.

FortiAuthenticator responds to an OCSP request that the user certificate status is unknown.

Full Access
Question # 30

Refer to the exhibit that shows VPN debugging output.

The VPN tunnel between headquarters and the branch office is not being established.

What is causing the problem?

A.

The Phase-1 encryption algorithms are not matching.

B.

There is no matching Diffie-Hellman Group.

C.

HQ is using IKE v1 and the branch office is using with IKE v2.

D.

There is a mismatch in the ISAKMP SA lifetime.

Full Access
Question # 31

Refer to the exhibit.

A customer needs to create a multi-tier MCLAG set up with the topology as shown in the exhibit.

A1/A2

B1/B2

C1/C2

Which command snippet should be applied to it, to allow active/active links in this topology?

A.

B.

C.

D.

Full Access