Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

FCP_FAZ_AN-7.4 Questions and Answers

Question # 6

Exhibit.

What can you conclude about these search results? (Choose two.)

A.

They can be downloaded to a file.

B.

They are sortable by columns and customizable.

C.

They are not available for analysis in FortiView.

D.

They were searched by using text mode.

Full Access
Question # 7

Exhibit.

What does the data point at 12:20 indicate?

A.

The log insert log time is increasing.

B.

FortiAnalyzer is using its cache to avoid dropping logs.

C.

The performance of FortiAnalyzer is below the baseline.

D.

The sqiplugind service is caught up with the logs

Full Access
Question # 8

Which log will generate an event with the status Contained?

A.

An AV log with action=quarantine.

B.

An IPS log with action=pass.

C.

A WebFilter log will action=dropped.

D.

An AppControl log with action=blocked.

Full Access
Question # 9

Which statement about SQL SELECT queries is true?

A.

They can be used to purge log entries from the database.

B.

They must be followed immediately by a WHERE clause.

C.

They can be used to display the database schema.

D.

They are not used in macros.

Full Access
Question # 10

Exhibit.

What is the analyst trying to create?

A.

The analyst is trying to create a trigger variable to the used in the playbook.

B.

The analyst is trying to create an output variable to be used in the playbook.

C.

The analyst is trying to create a report in the playbook.

D.

The analyst is trying to create a SOC report in the playbook.

Full Access
Question # 11

You must find a specific security event log in the FortiAnalyzer logs displayed in FortiView, but, so far, you have been uncuccessful.

Which two tasks should you perform to investigate why you are having this issue? (Choose two.)

A.

Open .gz log files in FortiView.

B.

Rebuild the SQL database and check FortiView.

C.

Review the ADOM data policy

D.

Check logs in the Log Browse

Full Access
Question # 12

What is the purpose of using data selectors when configuring event handlers?

A.

They filter the types of logs that FortiAnalyzer can accept from registered devices.

B.

They download new filters can be used in event handlers.

C.

They apply their filter criteria to the entire event handler so that you don’t have to configure the same criteria in the individual rules.

D.

They are common filters that can be applied simultaneously to all event handlers.

Full Access
Question # 13

What happens when the indicator of compromise (IOC) engine on FortiAnalyzer finds web logs that match blacklisted IP addresses?

A.

FortiAnalyzer flags the associated host for further analysis.

B.

A new infected entry is added for the corresponding endpoint under Compromised Hosts.

C.

The detection engine classifies those logs as Suspicious.

D.

The endpoint is marked as Compromised and, optionally, can be put in quarantine.

Full Access
Question # 14

Exhibit.

Assume these are all the events that exist on the FortiAnalyzer device.

How many events will be added to the incident created after running this playbook?

A.

Eleven events will be added.

B.

Seven events will be added

C.

No events will be added.

D.

Four events will be added.

Full Access
Question # 15

Refer to the exhibit.

What can you conclude about the output?

A.

The low indexing values require investigation.

B.

The output is not ADOM specific.

C.

There are more event logs than traffic logs.

D.

The log rate higher than the message rate is not normal.

Full Access
Question # 16

When managing incidents on FortiAnlyzer, what must an analyst be aware of?

A.

You can manually attach generated reports to incidents.

B.

The status of the incident is always linked to the status of the attach event.

C.

Severity incidents rated with the level High have an initial service-level agreement (SLA) response time of 1 hour.

D.

Incidents must be acknowledged before they can be analyzed.

Full Access