Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

FCP_FAZ_AN-7.4 FCP - FortiAnalyzer 7.4 Analyst Questions and Answers

Questions 4

What are two effects of enabling auto-cache in a FortiAnalyzer report? (Choose two.)

Options:

A.

The generation time for reports is decreased.

B.

When new logs are received, the hard-cache data is updated automatically.

C.

FortiAnalyzer local cache is used to store generated reports.

D.

The size of newly generated reports is optimized to conserve disk space.

Buy Now
Questions 5

Which FortiAnalyzer feature allows you to use a proactive approach when managing your network security?

Options:

A.

FortiView Monitor

B.

Outbreak alert services

C.

Incidents dashboard

D.

Threat hunting

Buy Now
Questions 6

You discover that a few reports are taking a long tine lo generate. Which two steps can you Like to troubleshoot? (Choose two.)

Options:

A.

Remove old reports from the hcache

B.

Enable auto-cache and run the reports again

C.

Increase the ADOM reports quota

D.

Review report diagnostics

Buy Now
Questions 7

Which statement about automation connectors in FortiAnalyzer is true?

Options:

A.

An ADOM with the Fabric type comes with multiple connectors configured.

B.

The local connector becomes available after you configured any external connector.

C.

The local connector becomes available after you connectors are displayed.

D.

The actions available with FortiOS connectors are determined by automation rules configured on FortiGate.

Buy Now
Questions 8

After generating a report, you notice the information you where expecting to see is not included in it. However, you confirm that the logs are there.

Options:

A.

Check the time frame covered by the report.

B.

Disable auto-cache.

C.

Increase the report utilization quota.

D.

Test the dataset

Buy Now
Questions 9

Which statement about the FortiSIEM management extension is correct?

Options:

A.

It allows you to manage the entire life cycle of a threat or breach.

B.

It can be installed as a dedicated VM.

C.

Its use of the available disk space is capped at 50%.

D.

It requires a licensed FortiSIEM supervisor.

Buy Now
Questions 10

What is the purpose of running the command diagnose sql status sqlreportd?

Options:

A.

To view a list of scheduled reports

B.

To list the current SQL processes running

C.

To display the SQL query connections and hcache status

D.

To identify the database log insertion status

Buy Now
Questions 11

Exhibit.

Laptop1 is used by several administrators to manage FotiAnalyzer. You want to configure a generic text filter that matches all login attempts to the web interface generated by any user other than admin’’, and coming from Laptop1.

Which filter will achieve the desired result?

Options:

A.

Operation-login and performed_on==’’GUI(10.1.1.100)’ and user!=admin

B.

Operation-login and performed_on==’’GU (10.1.1.120)’ and user!=admin

C.

Operation-login and srcip== 10.1.1.100 and dstip==10.1.1.1.210 and user==admin

D.

Operation-login and dstip==10.1.1.210 and user!-admin

Buy Now
Questions 12

You find that as part of your role as an analyst, you frequently search log View using the same parameters.

Instead of defining your search filters repeatedly, what can you do to save time?

Options:

A.

Configure a custom dashboard.

B.

Configure a custom view.

C.

Configure a data selector.

D.

Configure a marco and apply it to device groups.

Buy Now
Questions 13

Which two methods can you use to send notifications when an event occurs that matches a configured event handler? (Choose two.)

Options:

A.

Send Alert through Fabric Connectors

B.

Send SNMP trap

C.

Send SMS notification

D.

Send Alert through FortiSIEM MEA

Buy Now
Questions 14

You are tasked with finding logs corresponding to a suspected attack on your network.

You need to use an interface where all identified threats within timeframe are listed and organized. You also need to be able to quickly export the information to a PDF file.

Where can you go to accomplish this task?

Options:

A.

Log Browse

B.

Log View

C.

Fabric View

D.

FortiView

Buy Now
Questions 15

Refer to Exhibit:

Client-1 is trying to access the internet for web browsing.

All FortiGate devices in the topology are part of a Security Fabric with logging to FortiAnalyzer configured. All firewall policies have logging enabled. All web filter profiles are configured to log only violations.

Which statement about the logging behavior for this specific traffic flow is true?

Options:

A.

Only FGT-B will create traffic logs.

B.

FGT-B will see the MAC address of FGT-A as the destination and notifies FGT-A to log this flow.

C.

FGT B will create traffic logs and will create web filter logs if it detects a violation.

D.

Only FGT-A will create web filter logs if it detects a violation.

Buy Now
Questions 16

Which SQL query is in the correct order to query to database in the FortiAnalyzer?

Options:

A.

SELECT devid FROM $log GROUP BY devid WHERE ‘user’,,’ users1’

B.

SELECT FROM $log WHERE devid ‘user’,, USER1’ GROUP BY devid

C.

SELCT devid WHERE ’user’-‘ USER1’ FROM $log GROUP By devid

D.

SELECT devid FROM $log WHERE ‘user’=’ GROUP BY devid

Buy Now