Question 6 of 65

A company wants to protect against Denial of Service attacks and has launched a new project. They want to block the attacks that go above a certain threshold and for some others they are just trying to get a baseline of activity for those types of attacks so they are letting the traffic pass through without action. Given the following:
- The interface to the Internet is on WAN1.
- There is no requirement to specify which addresses are being protected or protected from.
- The protection is to extend to all services.
- The tcp_syn_flood attacks are to be recorded and blocked.
- The udp_flood attacks are to be recorded but not blocked.
- The tcp_syn_flood attacks threshold is to be changed from the default to 1000.
The exhibit shows the current DoS-policy.
Exam NSE8: Question 6 - Image 1
Which policy will implement the project requirements?
A)

Exam NSE8: Question 6 - Image 2
B)
Exam NSE8: Question 6 - Image 3
C)
Exam NSE8: Question 6 - Image 4
D)
Exam NSE8: Question 6 - Image 5
Answer

Suggested Answer

The suggested answer is B, D.

B&D both have same policy which fulfills the above criteria.
http://help.fortinet.com/fos50hlp/52data/Content/FortiOS/fortigate-firewall-52/Examples/Example-%20DoS%20Policy.htm
Question 7 of 65

Your security department has requested that you implement the OpenSSL.TLS.Heartbeat.Information.Disclosure signature using an IPS sensor to scan traffic destined to the FortiGate. You must log all packets that attempt to exploit this vulnerability.
Referring to the exhibit, which two configurations are required to accomplish this task? (Choose two.)
Exam NSE8: Question 7 - Image 1
A)
Exam NSE8: Question 7 - Image 2
B)
Exam NSE8: Question 7 - Image 3
C)
Exam NSE8: Question 7 - Image 4
D)
Exam NSE8: Question 7 - Image 5
Answer

Suggested Answer

The suggested answer is A, B.

http://defadhil.blogspot.in/2014/04/how-to-protect-fortigate-from.html
Community Votes1 vote
ADMost voted
100%
Question 8 of 65

Which command syntax would you use to configure the serial number of a FortiGate as its host name?
A)
Exam NSE8: Question 8 - Image 1
B)
Exam NSE8: Question 8 - Image 2
C)
Exam NSE8: Question 8 - Image 3
D)
Exam NSE8: Question 8 - Image 4
Answer

Suggested Answer

The suggested answer is C.

http://docs.fortinet.com/uploaded/files/2002/FortiOS%20Handbook%20-%20System%20Administration%205.2.pdf
Question 9 of 65

Referring to the exhibit, which statement is true?
Exam NSE8: Question 9 - Image 1
Answer

Suggested Answer

The suggested answer is A.

http://kb.fortinet.com/kb/viewContent.do?externalId=FD33101
Community Votes1 vote
BMost voted
100%
Question 10 of 65

You are asked to establish a VPN tunnel with a service provider using a third-party VPN device. The service provider has assigned subnet 30.30.30.0/24 for your outgoing traffic going towards the services hosted by the provider on network 20.20.20.0/24. You have multiple computers which will be accessing the remote services hosted by the service provider.
Exam NSE8: Question 10 - Image 1
Which three configuration components meet these requirements? (Choose three.)
Answer

Suggested Answer

The suggested answer is C, D, E.