Free NSE8_812 Exam Braindumps (page: 2)

Page 1 of 16

Review the VPN configuration shown in the exhibit.

What is the Forward Error Correction behavior if the SD-WAN network traffic download is 500 Mbps and has 8% of packet loss in the environment?

  1. 1 redundant packet for every 10 base packets
  2. 3 redundant packet for every 5 base packets
  3. 2 redundant packet for every 8 base packets
  4. 3 redundant packet for every 9 base packets

Answer(s): C

Explanation:

The FEC configuration in the exhibit specifies that if the packet loss is greater than 10%, then the FEC mapping will be 8 base packets and 2 redundant packets. The download bandwidth of 500 Mbps is not greater than 950 Mbps, so the FEC mapping is not overridden by the bandwidth setting. Therefore, the FEC behavior will be 2 redundant packets for every 8 base packets. Here is the explanation of the FEC mappings in the exhibit:
Packet loss greater than 10%: 8 base packets and 2 redundant packets. Upload bandwidth greater than 950 Mbps: 9 base packets and 3 redundant packets. The mappings are matched from top to bottom, so the first mapping that matches the conditions will be used. In this case, the first mapping matches because the packet loss is greater than 10%. Therefore, the FEC behavior will be 2 redundant packets for every 8 base packets.


Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/new-features/169010/adaptive- forward-error-correction-7-0-2



You are running a diagnose command continuously as traffic flows through a platform with NP6 and you obtain the following output:



Given the information shown in the output, which two statements are true? (Choose two.)

  1. Enabling bandwidth control between the ISF and the NP will change the output
  2. The output is showing a packet descriptor queue accumulated counter
  3. Enable HPE shaper for the NP6 will change the output
  4. Host-shortcut mode is enabled.
  5. There are packet drops at the XAUI.

Answer(s): B,E

Explanation:

The diagnose command shown in the output is used to display information about NP6 packet descriptor queues. The output shows that there are 16 NP6 units in total, and each unit has four XAUI ports (XA0-XA3). The output also shows that there are some non-zero values in the columns PDQ ACCU (packet descriptor queue accumulated counter) and PDQ DROP (packet descriptor queue drop counter). These values indicate that there are some packet descriptor queues that have reached their maximum capacity and have dropped some packets at the XAUI ports. This could be caused by congestion or misconfiguration of the XAUI ports or the ISF (Internal Switch Fabric).

The output is showing a packet descriptor queue accumulated counter, which is a measure of the number of packets that have been dropped by the NP6 due to congestion. The counter will increase if there are more packets than the NP6 can handle, which can happen if the bandwidth between the ISF and the NP is not sufficient or if the HPE shaper is enabled. The output also shows that there are packet drops at the XAUI, which is the interface between the NP6 and the FortiGate's backplane. This means that the NP6 is not able to keep up with the traffic and is dropping packets.
The other statements are not true. Host-shortcut mode is not enabled, and enabling bandwidth control between the ISF and the NP will not change the output. HPE shaper is a feature that can be enabled to improve performance, but it will not change the output of the diagnose command.


Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/cli-reference/19662/diagnose-np6-pdq

https://docs.fortinet.com/document/fortigate/7.4.0/hardware- acceleration/48875/diagnose-npu-np6-dce-np6-id-number-of-dropped-np6-packets



Which two methods are supported for importing user defined Lookup Table Data into the FortiSIEM? (Choose two.)

  1. Report
  2. FTP
  3. API
  4. SCP

Answer(s): A,C

Explanation:

FortiSIEM supports two methods for importing user defined Lookup Table Data:
Report: You can import lookup table data from a report. This is the most common method for importing lookup table data.
API: You can also import lookup table data using the FortiSIEM API. This is a more advanced method that allows you to import lookup table data programmatically. FTP, SCP, and other file transfer protocols are not supported for importing lookup table data into FortiSIEM.


Reference:

https://help.fortinet.com/fsiem/6-7-4/Online-Help/HTML5_Help/importing_lookup_table_data.htm



What is the benefit of using FortiGate NAC LAN Segments?

  1. It provides support for multiple DHCP servers within the same VLAN.
  2. It provides physical isolation without changing the IP address of hosts.
  3. It provides support for IGMP snooping between hosts within the same VLAN
  4. It allows for assignment of dynamic address objects matching NAC policy.

Answer(s): D

Explanation:

FortiGate NAC LAN Segments are a feature that allows users to assign different VLANs to different LAN segments without changing the IP address of hosts or bouncing the switch port. This provides physical isolation while maintaining firewall sessions and avoiding DHCP issues. One benefit of using FortiGate NAC LAN Segments is that it allows for assignment of dynamic address objects matching NAC policy. This means that users can create firewall policies based on dynamic address objects that match the NAC policy criteria, such as device type, OS type, MAC address, etc. This simplifies firewall policy management and enhances security by applying different security profiles to different types of devices.


Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/new-features/856212/nac- lan-segments-7-0-1






Post your Comments and Discuss Fortinet NSE8_812 exam with other Community members:

NSE8_812 Discussions & Posts