Total 106 Questions
Last Updated On : 26-Nov-2025
Refer to the exhibit, which shows a Branch1 configuration and routing table.

In the SD-WAN implicit rule, you do not want the traffic load balance for the overlay
interface when all members are available.
In this scenario, which configuration change will meet this requirement?
A. Change the load-balance-mode to source-ip-based.
B. Create a new static route with the internet sdwan-zone only
C. Configure the cost in each overlay member to 10.
D. Configure the priority in each overlay member to 10.
Explanation: The default load balancing mode for the SD-WAN implicit rule is source IP
based. This means that traffic will be load balanced evenly between the overlay members,
regardless of the member's priority.
To prevent traffic from being load balanced, you can configure the priority of each overlay
member to 10. This will make the member ineligible for load balancing.
The other options are not correct. Changing the load balancing mode to source-IP based
will still result in traffic being load balanced. Creating a new static route with the internet
sdwan-zone only will not affect the load balancing of the overlay interface. Configuring the
cost in each overlay member to 10 will also not affect the load balancing, as the cost is only
used when the implicit rule cannot find a match for the destination IP address.
You want to use the MTA adapter feature on FortiSandbox in an HA-Cluster. Which statement about this solution is true?
A. The configuration of the MTA Adapter Local Interface is different than on port1.
B. The MTA adapter is only available in the primary node.
C. The MTA adapter mode is only detection mode.
D. The configuration is different than on a standalone device.
Explanation: The MTA adapter feature on FortiSandbox is a feature that allows
FortiSandbox to act as a mail transfer agent (MTA) that can receive, inspect, and forward
email messages from externalsources. The MTA adapter feature can be used to integrate
FortiSandbox with third-party email security solutions that do not support direct integration
with FortiSandbox, such as Microsoft Exchange Server or Cisco Email Security Appliance
(ESA). The MTA adapter feature can also be used to enhance email security by adding an
additional layer of inspection and filtering before delivering email messages to the final
destination. The MTA adapter feature can be enabled on FortiSandbox in an HA-Cluster,
which is a configuration that allows two FortiSandbox units to synchronize their settings
and data and provide high availability and load balancing for sandboxing services.
However, one statement about this solution that is true is that the MTA adapter is only
available in the primary node. This means that only one FortiSandbox unit in the HACluster
can act as an MTA and receive email messages from external sources, while the
other unit acts as a backup node that can take over the MTA role if the primary node fails
or loses connectivity. This also means that only one IP address or FQDN can be used to
configure the external sources to send email messages to the FortiSandbox MTA, which is
the IP address or FQDN of the primary node.
Refer to the exhibit.

A FortiWeb appliance is configured for load balancing web sessions to internal web
servers. The Server Pool is configured as shown in the exhibit.
How will the sessions be load balanced between server 1 and server 2 during normal
operation?
A. Server 1 will receive 25% of the sessions, Server 2 will receive 75% of the sessions
B. Server 1 will receive 20% of the sessions, Server 2 will receive 66.6% of the sessions
C. Server 1 will receive 33.3% of the sessions, Server 2 will receive 66 6% of the sessions
D. Server 1 will receive 0% of the sessions Server 2 will receive 100% of the sessions
Explanation: The Server Pool in the exhibit is configured with a weight of 20 for server 1
and a weight of 60 for server 2. This means that server 1 will receive 20% of the sessions
and server 2 will receive 75% of the sessions.
The following formula is used to calculate the load balancing between servers in a Server
Pool:
weight_of_server_1 / (weight_of_server_1 + weight_of_server_2)
In this case, the formula is:
20 / (20 + 60) = 20 / 80 = 0.25 = 25%
Therefore, server 1 will receive 25% of the sessions and server 2 will receive 75% of the
sessions.
A customer's cybersecurity department needs to implement security for the traffic between
two VPCs in AWS, but these belong to different departments within the company. The
company uses a single region for all their VPCs.
Which two actions will achieve this requirement while keeping separate management of
each department's VPC? (Choose two.)
A. Create a transit VPC with a FortiGate HA cluster, connect to the other two using VPC peering, and use routing tables to force traffic through the FortiGate cluster.
B. Create an 1AM account for the cybersecurity department to manage both existing VPC, create a FortiGate HA Cluster on each VPC and IPSEC VPN to force traffic between the VPCs through the FortiGate clusters
C. Migrate all the instances to the same VPC and create 1AM accounts for each department, then implement a new subnet for a FortiGate auto-scaling group and use routing tables to force the traffic through the FortiGate cluster.
D. Create a VPC with a FortiGate auto-scaling group with a Transit Gateway attached to the three VPC to force routing through the FortiGate cluster
Explanation: To implement security for the traffic between two VPCs in AWS, while
keeping separate management of each department’s VPC, two possible actions are:
Create a transit VPC with a FortiGate HA cluster, connect to the other two using
VPC peering, and use routing tables to force traffic through the FortiGate cluster.
This option allows the cybersecurity department to manage the transit VPC and
apply security policies on the FortiGate cluster, while the other departments can
manage their own VPCs and instances. The VPC peering connections enable
direct communication between the VPCs without using public IPs or gateways.
The routing tables can be configured to direct all inter-VPC traffic to the transit
VPC.
Create a VPC with a FortiGate auto-scaling group with a Transit Gateway attached
to the three VPCs to force routing through the FortiGate cluster. This option also
allows the cybersecurity department to manage the security VPC and apply
security policies on the FortiGate cluster, while the other departments can manage
their own VPCs and instances. The Transit Gateway acts as a network hub that
connects multiple VPCs and on-premises networks. The routing tables can be
configured to direct all inter-VPC traffic to the security VPC.
Which two statements are correct on a FortiGate using the FortiGuard Outbreak Protection Service (VOS)? (Choose two.)
A. The FortiGuard VOS can be used only with proxy-base policy inspections.
B. If third-party AV database returns a match the scanned file is deemed to be malicious.
C. The antivirus database queries FortiGuard with the hash of a scanned file
D. The AV engine scan must be enabled to use the FortiGuard VOS feature
E. The hash signatures are obtained from the FortiGuard Global Threat Intelligence database.
Explanation:
C. The antivirus database queries FortiGuard with the hash of a scanned file. This
is how the FortiGuard VOS service works. The FortiGate queries FortiGuard with
the hash of a scanned file, and FortiGuard returns a list of known malware
signatures that match the hash.
E. The hash signatures are obtained from the FortiGuard Global Threat
Intelligence database. This is where the FortiGuard VOS service gets its hash
signatures from. The FortiGuard Global Threat Intelligence database is updated
regularly with new malware signatures.
You must analyze an event that happened at 20:37 UTC. One log relevant to the event is
extracted from FortiGate logs:

The devices and the administrator are all located in different time zones Daylight savings
time (DST) is disabled
• The FortiGate is at GMT-1000.
• The FortiAnalyzer is at GMT-0800
• Your browser local time zone is at GMT-03.00
You want to review this log on FortiAnalyzer GUI, what time should you use as a filter?
A. 20:37:08
B. 10:37:08
C. 17:37:08
D. 12.37:08
Explanation: To review this log on FortiAnalyzer GUI, the administrator should use the time filter that matches the local time zone of FortiAnalyzer, which is GMT-0800. Since the log was generated at 20:37 UTC (GMT+0000), the corresponding time in GMT-0800 is 20:37 - 8 hours = 12:37. However, since DST is disabled on FortiAnalyzer, the administrator should add one hour to account for daylight saving time difference, resulting in 12:37 + 1 hour = 13:37. Therefore, the time filter to use is 13:37:08.
A customer wants to use the FortiAuthenticator REST API to retrieve an SSO group called
SalesGroup. The following API call is being made with the 'curl' utility:

Which two statements correctly describe the expected behavior of the FortiAuthenticator
REST API? (Choose two.)
A. Only users with the "Full permission" role can access the REST API
B. This API call will fail because it requires that API version 2
C. If the REST API web service access key is lost, it cannot be retrieved and must be changed.
D. The syntax is incorrect because the API calls needs the get method.
Explanation: To retrieve an SSO group called SalesGroup using the FortiAuthenticator
REST API, the following issues need to be fixed in the API call:
The API version should be v2, not v1, as SSO groups are only supported in
version 2 of the REST API.
The HTTP method should be GET, not POST, as GET is used to retrieve
information from the server, while POST is used to create or update information on
the server. Therefore, a correct API call would look like this: curl -X GET -H
“Authorization: Bearer
| Page 5 out of 16 Pages |
| NSE8_812 Practice Test Home | Previous |
Our new Timed NSE8_812 Exam Simulation replicates the exact format, question count, and strict time limit of the real test.
We don't just test your knowledge; we build your Fortinet exam-day stamina and speed, so you can answer with confidence when it matters most.