New Year Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Fortinet FCP_FAZ_AN-7.6 Dumps

Fortinet NSE 5 - FortiAnalyzer 7.6 Analyst Questions and Answers

Question 1

Exhibit.

What can you conclude about these search results? (Choose two.)

Options:

A.

They can be downloaded to a file.

B.

They are sortable by columns and customizable.

C.

They are not available for analysis in FortiView.

D.

They were searched by using textmode.

Question 2

Exhibit.

Assume these are all the events that exist on the FortiAnalyzer device.

How many events will be added to the incident created after running this playbook?

Options:

A.

Eleven events will be added.

B.

Seven events will beadded

C.

No events will be added.

D.

Four events will be added.

Question 3

Which statement about exporting items in Report Definitions is true?

Options:

A.

Templates can be exported.

B.

Template exports contain associated charts and datasets.

C.

Chart exports contain associated datasets.

D.

Datasets can be exported.

Question 4

After a generated a repot, you notice the information you were expecting to see in not included in it. However, you confirm that the logs are there:

Which two actions should you perform? (Choose two.)

Options:

A.

Check the time frame covered by the report.

B.

Disable auto-cache.

C.

Increase the report utilization quota.

D.

Test the dataset.

Question 5

You mustfind a specific security event log in the FortiAnalyzer logs displayed in FortiView, but, so far, you have been uncuccessful.

Which two tasks should you perform to investigate why you are having this issue? (Choose two.)

Options:

A.

Open .gz log files in FortiView.

B.

Rebuild the SQL database and check FortiView.

C.

Review the ADOM data policy

D.

Check logs in the Log Browse

Question 6

Which statement about sending notifications with incident updates is true?

Options:

A.

Each connector used can have different notification settings

B.

Each incident can send notification to a single external platform.

C.

You must configure an output profile to send notifications by email.

D.

Notifications can be sent only when an incident is created oi deleted.

Question 7

Which statement about automation connectors in FortiAnalyzer is true?

Options:

A.

An ADOM with the Fabric type comes with multiple connectors configured.

B.

The local connector becomes available after you configured any external connector.

C.

The local connector becomes available after you connectors are displayed.

D.

The actions available with FortiOS connectors are determined by automation rules configured on FortiGate.

Question 8

As part of your analysis, you discover that a Medium severity level incident is fully remediated.

You change the incident status to Closed:Remediated.

Which statement about your update is true?

Options:

A.

The incident can no longer be deleted.

B.

The corresponding event will be marked as Mitigated.

C.

The incident dashboard will be updated.

D.

The incident severity will be lowered.

Question 9

Which two actions should an administrator take to vide Compromised Hosts on FortiAnalyzer? (Choose two.)

Options:

A.

Enable device detection on the FotiGate device that are sending logs to FortiAnalyzer.

B.

Enable web filtering in firewall policies on FortiGate devices, and make sure these logs are sent to fortiAnalyzer.

C.

Make sure all endpoints are reachable by FortiAnalyzer.

D.

Subscribe FortiAnalyzer to FortiGuard to keep its local threat database up to date.

Question 10

Exhibit.

as

Based on the partial outputs displayed, which devices can be members of a FotiAnalyzer Fabric?

Options:

A.

FortiAnalayzer1 and FortiAnalyzer3

B.

FortiAnalyzer1 and FortiAnalyzer2

C.

FortiAnalyzer2 and FortiAnalyzer3

D.

All devices listed can be members.

Question 11

You are tasked with finding logs corresponding to a suspected attack on your network.

You need to use an interface where all identified threats within timeframe are listed and organized. You also need to be able to quickly export the information to a PDF file.

Where can you go to accomplish this task?

Options:

A.

Log Browse

B.

Log View

C.

Fabric View

D.

FortiView

Question 12

Refer to Exhibit:

Client-1 is trying to access the internet for web browsing.

All FortiGate devices in the topology are part of a Security Fabric with logging to FortiAnalyzer configured. All firewall policies have logging enabled. All web filter profiles are configured to log only violations.

Which statement about the logging behavior for this specific traffic flow is true?

Options:

A.

Only FGT-B will create traffic logs.

B.

FGT-B will see the MAC address of FGT-A as the destination and notifies FGT-A to log this flow.

C.

FGT B will create traffic logs and will create web filter logs if it detects a violation.

D.

Only FGT-A will create web filter logs if it detects a violation.

Question 13

(In a FortiAnalyzer Fabric deployment, which three modules from Fabric members are available for analysis on the supervisor? (Choose three answers))

Options:

A.

Playbooks

B.

Indicators

C.

Logs

D.

Events

E.

Reports

Question 14

(Refer to the exhibit.

as

Which statement about the displayed event is correct? (Choose one answer))

Options:

A.

The security risk was dropped.

B.

The risk source is isolated.

C.

The security risk was blocked.

D.

The security event risk is from an application control log.

Question 15

(Refer to the exhibit.

as

Which two observations can you make after reviewing this log entry? (Choose two answers))

Options:

A.

This is a normalized log.

B.

This is a formatted view of the log.

C.

This is the original log that FortiAnalyzer received from FortiGate.

D.

This log is in a raw log format.

Question 16

Which two statement regarding the outbreak detection service are true? (Choose two.)

Options:

A.

An additional license is required.

B.

It automatically downloads new event handlers and reports.

C.

Outbreak alerts are available on the root ADOM only.

D.

New alerts are received by email.

Question 17

Exhibit.

as

What can you conclude about the output?

Options:

A.

The message ratebeing lower that the log rate is normal.

B.

Both messages and logs are almost finished indexing.

C.

There are more traffic logs than event logs.

D.

The output is ADOM specific

Question 18

Refer to Exhibit:

Whatdoes the data point at 21:20 indicate?

Options:

A.

FortiAnalyzer is indexing logs faster than logs are being received.

B.

The fortilogd daemon is ahead in indexing by one log.

C.

The SQL database requires a rebuild because of high receive lag.

D.

FortiAnalyzer is temporarily buffering received logs so older logs can be indexed first.

Question 19

(When there are no matching parsers for a device log, what does FortiAnalyzer do? (Choose one answer))

Options:

A.

Drops the log

B.

Applies the generic SYSLOG parser

C.

Stores the log but doesn’t normalize it

D.

Archives the log for future analysis

Question 20

Whathappens when the indicator of compromise (IOC) engine on FortiAnalyzer finds web logs that match blacklisted IP addresses?

Options:

A.

FortiAnalyzer flags the associated host for further analysis.

B.

A new infected entry is added for the corresponding endpoint under Compromised Hosts.

C.

The detection engine classifies those logs as Suspicious.

D.

The endpoint is marked as Compromised and, optionally, can be put in quarantine.

Page: 1 / 7
Total 67 questions