Fortinet NSE8_810 - Fortinet Network Security Expert 8 Written Exam (NSE8 810 - FortiOS 5.6) Exam

Page:    1 / 12   
Total 60 questions


Click the Exhibit button.
You are working on an entry level model FortiGate that has been configured in flow-based inspection mode with various settings optimized for performance. It default. Your customer has found that some virus samples are not being appears that the main Internet firewall policy is using the antivirus profile labelled caught by the FortiGate.
Referring to the exhibit, what is causing the problem?
set default-db configuration was set to extreme.

  • A. The set options scan configuration items should have been changed to set options scan avmonitor.
  • B. The
  • C. The default AV profile was modified to use quick scan-mode. mobile-malware-db configuration was set to enable.
  • D. The


Answer : C

Click the Exhibit button.


Referring to the exhibit, which two statements are true? (Choose two.)

  • A. port13 and port14 on FS448D-A should be connected to port13 and port14 on FS448D-B.
  • B. LAG-1 and LAG-2 should be connected to a single 4-port 802.3ad interface on the FortiGate-A.
  • C. LAG-3 on switches on FS448D-A and FS448D-B may be connected to a single 802.3ad trunk on another device.
  • D. LAG-1 and LAG-2 should be connected to a 4-port single 802.3ad trunk on another device.


Answer : BC


Click the Exhibit button.
You created a custom health-check for your FortiWeb deployment.
Referring to the output shown in the exhibit, which statement is true?

  • A. The FortiWeb must receive an RST packet from the server.
  • B. The FortiWeb must receive an HTTP 200 response code from the server.
  • C. The FortiWeb must receive an ICMP Echo Request from the server.
  • D. The FortiWeb must match the hash value of the page index html.


Answer : BC

A company has just deployed a new FortiMail in gateway mode. The administrator is asked to strengthen e-mail protection by applying the policies shown below.
-E-mail can only be accepted if a valid e-mail account exists.
-Only authenticated users can send e-mails out.
Which two actions will satisfy the requirements? (Choose two.)

  • A. Configure recipient address verification.
  • B. Configure inbound recipient policies.
  • C. Configure outbound recipient policies.
  • D. Configure access control rules.


Answer : DA

Click the Exhibit button.


Your company has two data centers (DC) connected using a Layer 3 network. Servers in farm A need to connect to servers in farm B as though they all were in the same Layer 2 segment. What would be configured on the FortiGates on each DC to allow such connectivity?

  • A. Create an IPsec tunnel with transport-mode encapsulation.
  • B. Create an IPsec tunnel with tunnel-mode encapsulation.
  • C. Create an IPsec tunnel with VXLAN encapsulation.
  • D. Create an IPsec tunnel with VLAN encapsulation.


Answer : C

Page:    1 / 12   
Total 60 questions