Fortinet Network Security Expert 8 Written (800)

Here you have the best Fortinet NSE8 practice exam questions

  • You have 65 total questions to study from
  • Each page has 5 questions, making a total of 13 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on October 28, 2025
  • This site is not affiliated with or endorsed by Fortinet.
Question 1 of 65
The dashboard widget indicates that FortiGuard Web Filtering is not reachable. However, AntiVirus, IPS, and Application Control have no problems as shown in the exhibit.
Exam NSE8: Question 1 - Image 1
You contacted Fortinets customer service and discovered that your FortiGuard Web Filtering contract is still valid for several months.
What are two reasons for this problem? (Choose two.)
    Correct Answer: A, B

Question 2 of 65
A customer is authenticating users using a FortiGate and an external LDAP server. The LDAP user, John Smith, cannot authenticate. The administrator runs the debug command diagnose debug application fnbamd 255 while John Smith attempts the authentication:
Based on the output shown in the exhibit, what is causing the problem?
Exam NSE8: Question 2 - Image 1
    Correct Answer: D

Question 3 of 65
Exam NSE8: Question 3 - Image 1
The exhibit shows an explicit Web proxy configuration in a FortiGate device. The FortiGate is installed between a client with the IP address 172.16.10.4 and a
Web server using port 80 with the IP address 10.10.3.4. The client Web browser is properly sending HTTP traffic to the FortiGate Web proxy IP address
172.16.10.254.
Which two sniffer commands will capture this HTTP traffic? (Choose two.)
    Correct Answer: C, D

Question 4 of 65
Your colleague has enabled virtual clustering to load balance traffic between the cluster units. You notice that all traffic is currently directed to a single FortiGate unit. Your colleague has applied the configuration shown in the exhibit.
Exam NSE8: Question 4 - Image 1
Which step would you perform to load balance traffic within the virtual cluster?
    Correct Answer: C

Question 5 of 65
A data center for example.com hosts several separate Web applications. Users authenticate with all of them by providing their Active Directory (AD) login credentials. You do not have access to Example, Inc.s AD server. Your solution must do the following:
- provide single sign-on (SSO) for all protected Web applications
- prevent login brute forcing
- scan FTPS connections to the Web servers for exploits
- scan Webmail for OWASP Top 10 vulnerabilities such as session cookie hijacking, XSS, and SQL injection attacks
Which solution meets these requirements?
    Correct Answer: D