● NSE 5 - FortiWeb 8.0 Administrator Exam Materials

Hello Dears, we again passed the NSE 5 - FortiWeb 8.0 Administrator Exam (NSE5_FWB_AD-8.0) today 05-April-2026, and added 10 new questions, However, this does not mean that the dump is fully ready yet, we still need 1 week to make sure the dump is fully prepared and validated, you can purchase it and start studying now, but please do not take the real exam until we provide our final feedback about the Dump status, Good luck





Question #1
Comment Image Comment Image Comment Image

You are setting up a FortiWeb policy to protect a customer login portal. Users connect to https://login.training.lab
, and you want FortiWeb to forward those requests to a load-balanced pool of back-end servers.

Which three components must you configure to complete the server policy? (Choose one answer)

  • A. Real server, IPsec tunnel, and static route
  • B. Web application firewall (WAF) profile, DoS policy, and server name indication (SNI)-based certificate
  • C. Virtual server, server pool, and port settings (service)
  • D. DNS resolver, URL rewrite rule, and HTTP health check
Question #2
Comment Image Comment Image Comment Image

Refer to the exhibit.

A FortiWeb administrator tests a new form input value after training the machine learning (ML) anomaly detection system.

The hidden Markov model (HMM) flags the input as abnormal, while the support vector machine (SVM) model classifies it as normal. FortiWeb allows the request.

What does this result indicate about the FortiWeb ML anomaly detection behavior? (Choose one answer)

  • A. FortiWeb is correctly allowing an unusual but non-malicious input based on combined HMM and SVM evaluation.
  • B. The anomaly detection thresholds are too low and must be increased.
  • C. FortiWeb failed to detect an attack and should have blocked the request.
  • D. One of the ML models should be disabled to avoid inconsistent results.
Question #3
Comment Image Comment Image Comment Image

Refer to the exhibit.

You are a FortiWeb administrator. FortiWeb is deployed between a FortiGate and two back-end web servers, as shown in the diagram. No server policies are currently configured on FortiWeb. While testing, you notice that a student system in the 100.64.0.0/24 network is still able to access the back-end servers in 10.1.1.0/24, even though FortiWeb is not logging or inspecting the traffic.

Which action should you take to ensure FortiWeb blocks or inspects all traffic before it reaches the back-end servers? (Choose one answer)

  • A. Configure FortiWeb in transparent mode to force traffic inspection.
  • B. Enable network address translation (NAT) mode on FortiWeb to hide the backend server IP addresses.
  • C. Add static routes on FortiGate to route traffic back through the FortiWeb internal interface.
  • D. Disable ip-forward to prevent traffic from passing through FortiWeb without a matching server policy.
Question #4
Comment Image Comment Image Comment Image

Which URL should you rewrite to reduce security risk? (Choose one answer)

  • A. https://www.example.com/25.3.6/Browse/MediaData
  • B. https://www.example.com/wordpress/?feed=rss2
  • C. https://www.example.com/products/today
  • D. https://www.example.com/about/team
Question #5
Comment Image Comment Image Comment Image

Refer to the exhibit.

A FortiWeb administrator notices an alert triggered under the Threshold Based Detection category, with the message: Threshold Based Content Scraping Detection (Bot Detection) violation.

Based on the log details, what is the most likely cause of this alert? (Choose one answer)

  • A. An automated script or bot systematically accessing multiple pages to extract web content
  • B. A layer 4 SYN flood attack overwhelming the web server
  • C. A client sending malformed HTTP requests due to browser incompatibility
  • D. A vulnerability scanner triggering rate limits by simulating browser behavior
Question #6
Comment Image Comment Image Comment Image

Your e-commerce platform is experiencing frequent SQL injection attempts. You need FortiWeb to actively inspect, enforce, and block attacks inline before traffic reaches the web servers.

The deployment must support the full FortiWeb security feature set without operational limitations, including protocol validation, attack detection, and policy enforcement.

Which FortiWeb operation mode should you configure to proactively intercept and block threats such as SQL injection attempts? (Choose one answer)

  • A. Reverse proxy
  • B. Web Cache Communication Protocol (WCCP) integration mode
  • C. Transparent bridge mode
  • D. Offline protection
Question #7
Comment Image Comment Image Comment Image

A third-party penetration test reveals that users can bypass login controls through a mobile API. Your current FortiWeb configuration includes zero trust network access (ZTNA) profiles and cookie security, but API protection and client management are not enabled. The security team asks you to recommend the most effective way to close this gap.

Which FortiWeb adjustment would best prevent future unauthorized API access? (Choose one answer)

  • A. Switch to a reverse-proxy mode to bypass cookie-based controls.
  • B. Enable API protection and client management to enforce identity checks on mobile API traffic.
  • C. Log only API traffic and rely on FortiAnalyzer for future alerts.
  • D. Replace ZTNA with bot protection to reduce false positives.
Question #8
Comment Image Comment Image Comment Image

Which statement best describes the difference between SAML authentication and HTML authentication in FortiWeb site publishing? (Choose one answer)

  • A. SAML authentication delegates login to an external system, while HTML authenticates directly on FortiWeb.
  • B. SAML authentication is used for internal apps while HTML authentication is used for cloud apps.
  • C. SAML authentication encrypts passwords while HTML authentication sends passwords in cleartext format.
  • D. SAML authentication uses a passwordless login, while HTML authentication uses tokens.
Question #9
Comment Image Comment Image Comment Image

A FortiWeb administrator needs to protect new API endpoints that a development team is publishing.

To secure these API endpoints, which three configuration actions should the administrator perform on FortiWeb? (Choose three answers)

  • A. Configure Active Directory (AD) single sign-on (SSO) for the web portal.
  • B. Apply API schema validation to incoming requests.
  • C. Enable machine learning (ML)–based API protection.
  • D. Enforce API user key requirements in the API policy.
  • E. Activate SAML authentication for general user access.
Question #10
Comment Image Comment Image Comment Image

FortiWeb is blocking groups of users behind your load balancer. In the logs, all users show the same source IP address.

Which action should you take to restore proper client identification? (Choose one answer)

  • A. Add a bot detection rule in the protection profile.
  • B. Update the signature engine.
  • C. Enable caching for HTTPS traffic.
  • D. Reconfigure the load balancer to insert the original client IP address in an HTTP header.