New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FCP_FAZ_AD-7.4 Questions and Answers

Question # 6

Which two constraints can impact the amount of reserved disk space required by FortiAnalyzer? (Choose

two.)

A.

License type

B.

Disk size

C.

Total quota

D.

RAID level

Full Access
Question # 7

Refer to the exhibit.

What does the data point at 12:20 indicate?

A.

The performance of FortiAnalyzer is below the baseline.

B.

FortiAnalyzer is using its cache to avoid dropping logs.

C.

The log insert lag time is increasing.

D.

The sqlplugind service is caught up with new logs.

Full Access
Question # 8

Refer to the exhibit.

Based on the partial outputs displayed, which devices can be members of a FortiAnalyzer Fabric?

A.

FortiAnalyzerl and FortiAnalyzer3

B.

FortiAnalyzer1 and FortiAnalyzer2

C.

All devices listed can be members

D.

FortiAnalyzer2 and FortiAnalyzer3

Full Access
Question # 9

An administrator has configured the following settings:

What is the purpose of executing these commands?

A.

To record the hash value and authentication code of log files.

B.

To encrypt log transfer between FortiAnalyzer and other devices.

C.

To create the secure channel used by the OFTP process.

D.

To verify the integrity of the log files received.

Full Access
Question # 10

Which log type does the FortiAnalyzer indicators of compromise feature use to identify infected hosts?

A.

Antivirus logs

B.

Web filter logs

C.

IPS logs

D.

Application control logs

Full Access
Question # 11

Which two statements are true regarding log fetching on FortiAnalyzer? (Choose two.)

A.

A FortiAnalyzer device can perform either the fetch server or client role, and it can perform two roles at the same time with the same FortiAnalyzer devices at the other end.

B.

Log fetching can be done only on two FortiAnalyzer devices that are running the same firmware version.

C.

Log fetching allows the administrator to fetch analytics logs from another FortiAnalyzer for redundancy.

D.

Log fetching allows the administrator to run queries and reports against historical data by retrieving archived logs from one FortiAnalyzer device and sending them to another FortiAnalyzer device.

Full Access
Question # 12

What is the purpose of using prefilters when configuring event handlers?

A.

They limit which logs are checked for matches by the other filters.

B.

They can filter the logs before they are processed by FortiAnalyzer

C.

They download new filters to be used in event handlers.

D.

They are common filters applied simultaneously to all event handlers.

Full Access
Question # 13

Refer to the exhibit.

Which two statements are true regarding enabling auto-cache on FortiAnalyzer? (Choose two.)

A.

Report size will be optimized to conserve disk space on FortiAnalyzer.

B.

Reports will be cached in the memory.

C.

This feature is automatically enabled for scheduled reports.

D.

Enabling auto-cache reduces report generation time for reports that require a long time to assemble datasets.

Full Access
Question # 14

What is the best approach to handle a hard disk failure on a FortiAnalyzer that supports hardware RAID?

A.

There is no need to do anything because the disk will self-recover.

B.

Run execute format disk to format and restart the FortiAnalyzer device.

C.

Perform a hot swap of the disk.

D.

Shut down FortiAnalyzer and replace the disk.

Full Access
Question # 15

Which two statements about deleting ADOMs are true? (Choose two.)

A.

Logs must be purged or migrated before you can delete an ADOM.

B.

ADOMs with registered devices cannot be deleted.

C.

Default ADOMs cannot be deleted.

D.

The status of the ADOMs must be unlocked.

Full Access
Question # 16

Which two settings must you configure on FortiAnalyzer to allow non-local administrators to authenticate on FortiAnalyzer with any user account in a single LDAP group? (Choose two.)

A.

A local wildcard administrator account

B.

An administrator group

C.

One or more remote LDAP servers

D.

LDAP servers IP addresses added as trusted hosts

Full Access
Question # 17

Which statements are true regarding securing communications between FortiAnalyzer and FortiGate with IPsec? (Choose two.)

A.

Must configure the FortiAnalyzer end of the tunnel only--the FortiGate end is auto-negotiated.

B.

Must establish an IPsec tunnel ID and pre-shared key.

C.

IPsec cannot be enabled if SSL is enabled as well.

D.

IPsec is only enabled through the CLI on FortiAnalyzer.

Full Access
Question # 18

After generating a report, you notice the information you were expecting to see is not included in it. What are two possible reasons for this scenario? (Choose two.)

A.

You enabled auto-cache with extended log filtering.

B.

The logfiled service has not indexed all the expected logs.

C.

The logs were overwritten by the data retention policy.

D.

The time frame selected in the report is wrong.

Full Access
Question # 19

Refer to the exhibit.

The capture displayed was taken on a FortiAnalyzer.

Why is a single IP address shown as the source for all logs received?

A.

FortiAnalyzer is using the device MAC addresses to differentiate their logs.

B.

The logs belong to devices that are part of a high availability (HA) cluster.

C.

FortiAnalyzer is receiving logs from the root FortiGate of a Security Fabric.

D.

The device sending logs has two VDOMs in the same ADOM.

Full Access
Question # 20

What is the main purpose of using an NTP server on FortiAnalyzer and all of its registered devices?

A.

Log correlation

B.

Host name resolution

C.

Log collection

D.

Real-time forwarding

Full Access
Question # 21

Refer to the exhibit.

What is the purpose of using the Chart Builder feature on FortiAnalyzer?

A.

To add a new chart under FortiView to be used in new reports

B.

To build a dataset and chart automatically, based on the filtered search results

C.

To add charts directly to generate reports in the current ADOM

D.

To build a chart automatically based on the top 100 log entries

Full Access
Question # 22

How can you attach a report to an incident?

A.

By attaching it to an event handler alert

B.

By editing the settings of the desired report

C.

From the properties of an existing incident

D.

Saving it in JSON format, and then importing it

Full Access
Question # 23

What can the CLI command # diagnose test application oftpd 3 help you to determine?

A.

What devices and IP addresses are connecting to FortiAnalyzer

B.

What logs, if any, are reaching FortiAnalyzer

C.

What ADOMs are enabled and configured

D.

What devices are registered and unregistered

Full Access
Question # 24

The admin administrator is failing to register a FortiClient EMS on the FortiAnalyzer device.

What can be the reason for this failure?

A.

FortiAnalyzer is in an HA cluster.

B.

ADOM mode should be set to advanced, in order to register the FortiClient EMS device.

C.

ADOMs are not enabled on FortiAnalyzer.

D.

A separate license is required on FortiAnalyzer in order to register the FortiClient EMS device.

Full Access
Question # 25

Which two statements regarding FortiAnalyzer log forwarding modes are true? (Choose two.)

A.

Both modes, forwarding and aggregation, support encryption of logs between devices.

B.

In aggregation mode, you can forward logs to syslog and CEF servers.

C.

Forwarding mode forwards logs in real time only to other FortiAnalyzer devices.

D.

Aggregation mode stores logs and content files and uploads them to another FortiAnalyzer device at a scheduled time.

Full Access
Question # 26

You are trying to initiate an authorization request from FortiGate to FortiAnalyzer, but the Security Fabric window does not open when you click Authorize.

Which two reasons can cause this to happen? (Choose two.)

A.

A pre-shared key needs to be established on both sides.

B.

The management computer does not have connectivity to the authorization IP address and port combination.

C.

The Security Fabric root is unauthorized and needs to be added as a trusted host.

D.

The fabric authorization settings on FortiAnalyzer are misconfigured.

Full Access
Question # 27

What are two advantages of setting up fabric ADOM? (Choose two.)

A.

It can be used for fast data processing and log correlation

B.

It can be used to facilitate communication between devices in same Security Fabric

C.

It can include all Fortinet devices that are part of the same Security Fabric

D.

It can include only FortiGate devices that are part of the same Security Fabric

Full Access
Question # 28

Which two statements are true regarding the outbreak detection service? (Choose two.)

A.

New alerts are received by email.

B.

Outbreak alerts are available on the root ADOM only.

C.

An additional license is required.

D.

It automatically downloads new event handlers and reports.

Full Access
Question # 29

The connection status of a new device on FortiAnalyzer is listed as Unauthorized.

What does that status mean?

A.

It is a device whose registration has not yet been accepted in FortiAnalvzer.

B.

It is a device that has not yet been assigned an ADOM.

C.

It is a device that is waiting for you to configure a pre-shared key.

D.

It is a device that FortiAnalvzer does not support.

Full Access
Question # 30

How can you configure FortiAnalyzer to permit administrator logins from only specific locations?

A.

Use static routes

B.

Use administrative profiles

C.

Use trusted hosts

D.

Use secure protocols

Full Access
Question # 31

When working with FortiAnalyzer reports, what is the purpose of a dataset?

A.

To provide the layout used for reports

B.

To define the chart type to be used

C.

To retrieve data from the database

D.

To set the data included in templates

Full Access
Question # 32

What are offline logs on FortiAnalyzer?

A.

Compressed logs, which are also known as archive logs, are considered to be offline logs.

B.

When you restart FortiAnalyzer. all stored logs are considered to be offline logs.

C.

Logs that are indexed and stored in the SQL database.

D.

Logs that are collected from offline devices after they boot up.

Full Access
Question # 33

What does the disk status Degraded mean for RAID management?

A.

One or more drives are missing from the FortiAnalyzer unit. The drive is no longer available to the operating system.

B.

The FortiAnalyzer device is writing to all the hard drives on the device in order to make the array fault tolerant.

C.

The FortiAnalyzer device is writing data to a newly added hard drive in order to restore the hard drive to an optimal state.

D.

The hard driveiIs no longer being used by the RAID controller

Full Access
Question # 34

Which clause is considered mandatory in SELECT statements used by the FortiAnalyzer to generate reports?

A.

FROM

B.

LIMIT

C.

WHERE

D.

ORDER BY

Full Access
Question # 35

What is the purpose of trigger variables?

A.

To display statistics about the playbook runtime

B.

To use information from the trigger to filter the action in a task

C.

To provide the trigger information to make the playbook start running

D.

To store the start times of playbooks with On_Schedule triggers

Full Access
Question # 36

What are two benefits of using fabric connectors? (Choose two.)

A.

They allow FortiAnalyzer to send logs in real-time to public cloud accounts.

B.

You do not need an additional license to send logs to the cloud platform.

C.

Fabric connectors allow you to improve redundancy.

D.

Using fabric connectors is more efficient than using third-party polling with API.

Full Access
Question # 37

Refer to the exhibit.

Laptopt is used by several administrators to manage FortiAnalyzer. You want to configure a generic text filter that matches all login attempts to the web interface generated by any user other than "admin" and coming from Laptop1:

Which filter will achieve the desired result?

A.

operation-login & performed_on=="GUI(10.1.1.100)" & user!=admin

B.

operation-login & srcip==10.1.1.100 & dstip==10.1.1.210 & user==admin

C.

operation-login & dstip==10.1.1.210 & userl-admin

D.

operation-login & performed_on=="GUI(10.1.1.210)' & user!=admin

Full Access
Question # 38

After you have moved a registered logging device out of one ADOM and into a new ADOM, what is the

purpose of running the following CLI command?

execute sql-local rebuild-adom

A.

To reset the disk quota enforcement to default

B.

To remove the analytics logs of the device from the old database

C.

To migrate the archive logs to the new ADOM

D.

To populate the new ADOM with analytical logs for the moved device, so you can run reports

Full Access
Question # 39

FortiAnalyzer centralizes which functions? (Choose three)

A.

Network analysis

B.

Graphical reporting

C.

Content archiving / data mining

D.

Vulnerability assessment

E.

Security log analysis / forensics

Full Access
Question # 40

In the FortiAnalyzer FortiView, source and destination IP addresses from FortiGate devices are not resolving to a hostname.

How can you resolve the source and destination IP addresses, without introducing any additional performance impact to FortiAnalyzer?

A.

Resolve IP addresses on a per-ADOM basis to reduce delay on FortiView while IPs resolve

B.

Configure # set resolve-ip enable in the system FortiView settings

C.

Configure local DNS servers on FortiAnalyzer

D.

Resolve IP addresses on FortiGate

Full Access
Question # 41

Which two of the following must you configure on FortiAnalyzer to email a FortiAnalyzer report externally?

(Choose two.)

A.

Mail server

B.

Output profile

C.

SFTP server

D.

Report scheduling

Full Access
Question # 42

What FortiGate process caches logs when FortiAnalyzer is not reachable?

A.

logfiled

B.

sqlplugind

C.

oftpd

D.

miglogd

Full Access
Question # 43

If you upgrade the FortiAnalyzer firmware, which report element can be affected?

A.

Custom datasets

B.

Report scheduling

C.

Report settings

D.

Output profiles

Full Access
Question # 44

FortiAnalyzer uses the Optimized Fabric Transfer Protocok (OFTP) over SSL for what purpose?

A.

To upload logs to an SFTP server

B.

To prevent log modification during backup

C.

To send an identical set of logs to a second logging server

D.

To encrypt log communication between devices

Full Access
Question # 45

An administrator, fortinet, can view logs and perform device management tasks, such as adding and removing registered devices. However, administrator fortinet is not able to create a mail server that can be used to send alert emails.

What can be the problem?

A.

ADOM mode is configured with Advanced mode.

B.

A trusted host is configured.

C.

fortinet is assigned the default Standard_User administrative profile.

D.

fortinet is assigned the default Restricted_User administrative profile.

Full Access
Question # 46

What must you consider when using log fetching? (Choose two.)

A.

The fetch client can retrieve logs from devices that are not added to its local Device Manager

B.

You can use filters to include only logs from a single device.

C.

The fetching profile must include a user with the Super_User profile.

D.

The archive logs retrieved from the server become archive logs in the client.

Full Access
Question # 47

What happens when a log file saved on FortiAnalyzer disks reaches the size specified in the device log

settings?

A.

The log file is stored as a raw log and is available for analytic support.

B.

The log file rolls over and is archived.

C.

The log file is purged from the database.

D.

The log file is overwritten.

Full Access
Question # 48

Which two settings must you configure on FortiAnalyzer to allow non-local administrators to authenticate to FortiAnalyzer with any user account in a single LDAP group? (Choose two.)

A.

A local wildcard administrator account

B.

A remote LDAP server

C.

A trusted host profile that restricts access to the LDAP group

D.

An administrator group

Full Access
Question # 49

FortiAnalyzer reports are dropping analytical data from 15 days ago, even though the data policy setting for

analytics logs is 60 days.

What is the most likely problem?

A.

Quota enforcement is acting on analytical data before a report is complete

B.

Logs are rolling before the report is run

C.

CPU resources are too high

D.

Disk utilization for archive logs is set for 15 days

Full Access
Question # 50

Which two parameters impact the amount of reserved disk space required by FortiAnalyzer? (Choose two.)

A.

Total quota

B.

License type

C.

RAID level

D.

Disk size

Full Access
Question # 51

What is the purpose of a predefined template on the FortiAnalyzer?

A.

It can be edited and modified as required

B.

It specifies the report layout which contains predefined texts, charts, and macros

C.

It specifies report settings which contains time period, device selection, and schedule

D.

It contains predefined data to generate mock reports

Full Access