New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet NSE8_812 Exam - Topic 2 Question 49 Discussion

Actual exam question for Fortinet's NSE8_812 exam
Question #: 49
Topic #: 2
[All NSE8_812 Questions]

Which two statements are correct on a FortiGate using the FortiGuard Outbreak Protection Service (VOS)? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: C, E

C . The antivirus database queries FortiGuard with the hash of a scanned file. This is how the FortiGuard VOS service works. The FortiGate queries FortiGuard with the hash of a scanned file, and FortiGuard returns a list of known malware signatures that match the hash.

E . The hash signatures are obtained from the FortiGuard Global Threat Intelligence database. This is where the FortiGuard VOS service gets its hash signatures from. The FortiGuard Global Threat Intelligence database is updated regularly with new malware signatures.

https://docs.fortinet.com/document/fortigate/7.4.1/administration-guide/889364/fortiguard-outbreak-prevention


Contribute your Thoughts:

0/2000 characters
Annalee
2 months ago
B seems a bit extreme, doesn't it?
upvoted 0 times
...
Tish
2 months ago
Wait, are we sure about A? That sounds off.
upvoted 0 times
...
Talia
2 months ago
Totally agree with C!
upvoted 0 times
...
Una
3 months ago
I think C and E are the right answers.
upvoted 0 times
...
Bobbie
3 months ago
D is definitely a must for VOS to work.
upvoted 0 times
...
Cheryl
3 months ago
I think option C is correct because it makes sense that the antivirus database would query FortiGuard with the file hash, but I’m not 100% confident.
upvoted 0 times
...
Mattie
3 months ago
I have a vague recollection that the hash signatures come from FortiGuard, so option E sounds familiar, but I can't quite recall the details.
upvoted 0 times
...
Arminda
4 months ago
I remember practicing a question about how the AV engine interacts with FortiGuard, so I feel like option D is definitely one of the answers.
upvoted 0 times
...
Meaghan
4 months ago
I think option A might be correct, but I'm not entirely sure if VOS can work with other types of inspections too.
upvoted 0 times
...
Coral
4 months ago
This is a good test of my knowledge on the FortiGuard VOS feature. I'm confident I can identify the two correct statements.
upvoted 0 times
...
Jesusita
4 months ago
I'm a bit confused by the difference between the AV database and the FortiGuard Global Threat Intelligence database. I'll need to review that part before answering.
upvoted 0 times
...
Leigha
4 months ago
Okay, I think I've got a good handle on how the FortiGuard VOS works. I'm ready to select the two correct statements.
upvoted 0 times
...
Raylene
5 months ago
Hmm, the wording on some of these options is a bit tricky. I'll need to read through them carefully to determine which two are correct.
upvoted 0 times
...
Stephanie
5 months ago
This question seems straightforward, but I want to make sure I understand the FortiGuard Outbreak Protection Service (VOS) correctly before selecting the answers.
upvoted 0 times
...
Cecilia
6 months ago
I'm not sure about A. Can someone explain why the FortiGuard VOS can be used only with proxy-base policy inspections?
upvoted 0 times
...
Lucina
7 months ago
Haha, Helaine's got a point. These certification exams love their trick questions. But I think Tammy and Gail are on the right track with B and E.
upvoted 0 times
...
Helaine
7 months ago
Ha! I bet the exam writers thought they could trick us with that one. Obviously, D is the key - you need the AV engine enabled to use the FortiGuard VOS feature.
upvoted 0 times
Asha
6 months ago
I think C is also correct, the antivirus database queries FortiGuard with the hash of a scanned file.
upvoted 0 times
...
Asha
7 months ago
I agree, D is definitely one of the correct statements.
upvoted 0 times
...
...
Dortha
8 months ago
I agree with you, Lacey. I also believe E is correct because the hash signatures are obtained from the FortiGuard Global Threat Intelligence database.
upvoted 0 times
...
Gail
8 months ago
I agree with Tammy. C and E seem to be the right choices here. The AV engine queries the FortiGuard database using the file hash.
upvoted 0 times
...
Tammy
8 months ago
Hmm, I think B and E are the correct answers. The FortiGuard VOS uses the FortiGuard database to detect malicious files, not just third-party AV.
upvoted 0 times
Thea
7 months ago
That's right, if a match is found in the FortiGuard database, the file is considered malicious.
upvoted 0 times
...
Gaston
7 months ago
Yes, the hash signatures are obtained from the FortiGuard Global Threat Intelligence database.
upvoted 0 times
...
Merissa
7 months ago
I agree, B and E are the correct answers. The FortiGuard VOS uses the FortiGuard database for detection.
upvoted 0 times
...
...
Lacey
8 months ago
I think C is correct because the antivirus database queries FortiGuard with the hash of a scanned file.
upvoted 0 times
...

Save Cancel