Which two statements about FortiSOAR virtual instance deployment requirements are true? (Choose two.)

View the exhibit. The dataset on FortiSOAR has been trained to predict which record field?
Refer to the exhibit.

Which statement correctly describes the user's login behavior?
What are two different services that you can configure for monitoring system and cluster health statuses on FortiSOAR?
(Choose two.)
A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)
Refer to the exhibit.

When importing modules to FortiSOAR using the configuration wizard, what actions are applied to fields it you select Merge with Existing as the Bulk action?
Which playbook collection includes system-level playbooks that FortiSOAR uses to auto-populate date fields when the status of incident or alert records changes to Resolved or Closed?