New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Certified Professional Security Operations > NSE7_SOC_AR-7.6

NSE7_SOC_AR-7.6 Fortinet NSE 7 - Security Operations 7.6 Architect Question and Answers

Question # 4

Which two statements about the FortiAnalyzer Fabric topology are true? (Choose two.)

A.

Downstream collectors can forward logs to Fabric members.

B.

Logging devices must be registered to the supervisor.

C.

The supervisor uses an API to store logs, incidents, and events locally.

D.

Fabric members must be in analyzer mode.

Full Access
Question # 5

Refer to the exhibits.

You configured a custom event handler and an associated rule to generate events whenever FortiMail detects spam emails. However, you notice that the event handler is generating events for both spam emails and clean emails.

Which change must you make in the rule so that it detects only spam emails?

A.

In the Log Type field, select Anti-Spam Log (spam)

B.

In the Log filter by Text field, type type==spam.

C.

Disable the rule to use the filter in the data selector to create the event.

D.

In the Trigger an event when field, select Within a group, the log field Spam Name (snane) has 2 or more unique values.

Full Access
Question # 6

Refer to the exhibits.

The FortiMail Sender Blocklist playbook is configured to take manual input and add those entries to the FortiMail abc. com domain-level block list. The playbook is configured to use a FortiMail connector and the ADD_SENDER_TO_BLOCKLIST action.

Why is the FortiMail Sender Blocklist playbook execution failing7

A.

You must use the GET_EMAIL_STATISTICS action first to gather information about email messages.

B.

FortiMail is expecting a fully qualified domain name (FQDN).

C.

The client-side browser does not trust the FortiAnalzyer self-signed certificate.

D.

The connector credentials are incorrect

Full Access
Question # 7

Refer to the exhibits.

You configured a spearphishing event handler and the associated rule. However. FortiAnalyzer did not generate an event.

When you check the FortiAnalyzer log viewer, you confirm that FortiSandbox forwarded the appropriate logs, as shown in the raw log exhibit.

What configuration must you change on FortiAnalyzer in order for FortiAnalyzer to generate an event?

A.

In the Log Type field, change the selection to AntiVirus Log(malware).

B.

Configure a FortiSandbox data selector and add it tothe event handler.

C.

In the Log Filter by Text field, type the value: .5 ub t ype ma Iwa re..

D.

Change trigger condition by selecting. Within a group, the log field Malware Kame (mname> has 2 or more unique values.

Full Access
Question # 8

Refer to the exhibits.

Assume that the traffic flows are identical, except for the destination IP address. There is only one FortiGate in network address translation (NAT) mode in this environment.

Based on the exhibits, which two conclusions can you make about this FortiSIEM incident? (Choose two answers)

A.

The client 10.200.3.219 is conducting active reconnaissance.

B.

FortiGate is not routing the packets to the destination hosts.

C.

The destination hosts are not responding.

D.

FortiGate is blocking the return flows.

Full Access
Question # 9

Which two ways can you create an incident on FortiAnalyzer? (Choose two answers)

A.

Using a custom event handler

B.

Using a connector action

C.

Manually, on the Event Monitor page

D.

By running a playbook

Full Access
Question # 10

Refer to the exhibit. What is the correct Jinja expression to filter the results to show only the MD5 hash values?

{{ [slot 1] | [slot 2] [slot 3].[slot 4] }}

Select the Jinja expression in the left column, hold and drag it to a blank position on the right. Place the four correct steps in order, placing the first step in the first slot.

Full Access
Question # 11

Which FortiAnalyzer feature uses the SIEM database for advance log analytics and monitoring?

A.

Threat hunting

B.

Asset Identity Center

C.

Event monitor

D.

Outbreak alerts

Full Access
Question # 12

Which of the following are critical when analyzing and managing events and incidents in a SOC? (Choose two answers)

A.

Accurate detection of threats

B.

Immediate escalation for all alerts

C.

Rapid identification of false positives

D.

Periodic system downtime for maintenance

Full Access
Question # 13

When you use a manual trigger to save user input as a variable, what is the correct Jinja expression to reference the variable? (Choose one answer)

A.

{{ vars.input.params. }}

B.

{{ globalVars. }}

C.

{{ vars.item. }}

D.

{{ vars.steps. }}

Full Access
Question # 14

When does FortiAnalyzer generate an event?

A.

When a log matches a filter in a data selector

B.

When a log matches an action in a connector

C.

When a log matches a rule in an event handler

D.

When a log matches a task in a playbook

Full Access
Question # 15

Refer to the exhibits.

The Malicious File Detect playbook is configured to create an incident when an event handler generates a malicious file detection event.

Why did the Malicious File Detect playbook execution fail?

A.

The Create Incident task was expecting a name or number as input, but received an incorrect data format

B.

The Get Events task did not retrieve any event data.

C.

The Attach_Data_To_lncident incident task wasexpecting an integer, but received an incorrect data format.

D.

The Attach Data To Incident task failed, which stopped the playbook execution.

Full Access
Question # 16

Which statement describes automation stitch integration between FortiGate and FortiAnalyzer?

A.

An event handler on FortiAnalyzer executes an automation stitch when an event is created.

B.

An automation stitch is configured on FortiAnalyzer and mapped to FortiGate using the FortiOS connector.

C.

An event handler on FortiAnalyzer is configured to send a notification to FortiGate to trigger an automation stitch.

D.

A security profile on FortiGate triggers a violation and FortiGate sends a webhook call to FortiAnalyzer.

Full Access
Question # 17

Refer to the exhibit.

You notice that the custom event handler you configured to detect SMTP reconnaissance activities is creating a large number of events. This is overwhelming your notification system.

How can you fix this?

A.

Increase the trigger count so that it identifies and reduces the count triggered by a particular group.

B.

Disable the custom event handler because it is not working as expected.

C.

Decrease the time range that the custom event handler covers during the attack.

D.

Increase the log field value so that it looks for more unique field values when it creates the event.

Full Access