Weekend Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Network Security Expert > FCP_FAZ_AD-7.4

FCP_FAZ_AD-7.4 FCP - FortiAnalyzer 7.4 Administrator Question and Answers

Question # 4

How do you restrict an administrator’s access to a subset of your organization’s ADOMs?

A.

Set the ADOM mode to Advanced

B.

Assign the ADOMs to the administrator’s account

C.

Configure trusted hosts

D.

Assign the default Super_User administrator profile

Full Access
Question # 5

Which item must you configure on FortiAnalyzer to email generated reports automatically?

A.

Output profile

B.

Report scheduling

C.

SFTP server

D.

SNMP server

Full Access
Question # 6

Which log type does the FortiAnalyzer indicators of compromise feature use to identify infected hosts?

A.

Antivirus logs

B.

Web filter logs

C.

IPS logs

D.

Application control logs

Full Access
Question # 7

If the primary FortiAnalyzer in an HA cluster fails, how is the new primary elected?

A.

The configured IP address is checked first.

B.

The active port number is checked first.

C.

The firmware version is checked first.

D.

The configured priority is checked first

Full Access
Question # 8

Why should you use an NTP server on FortiAnalyzer and all registered devices that log into FortiAnalyzer?

A.

To properly correlate logs

B.

To use real-time forwarding

C.

To resolve host names

D.

To improve DNS response times

Full Access
Question # 9

Refer to the exhibit.

Which statement is correct regarding the event displayed?

A.

The security risk was blocked or dropped.

B.

The security event risk is considered open.

C.

An incident was created from this event.

D.

The risk source is isolated.

Full Access
Question # 10

What can you do on FortiAnalyzer to restrict administrative access from specific locations?

A.

Configure trusted hosts for that administrator.

B.

Enable geo-location services on accessible interface.

C.

Configure two-factor authentication with a remote RADIUS server.

D.

Configure an ADOM for respective location.

Full Access
Question # 11

What are offline logs on FortiAnalyzer?

A.

Compressed logs, also known as archive logs

B.

Logs that are indexed and stored in the SQL database

C.

Any logs collected from offline devices after they boot up

D.

Real-time logs that are not yet indexed

Full Access
Question # 12

Which log will generate an event with the status Contained?

A.

An IPS log with action=pass.

B.

A WebFilter log with action=dropped.

C.

An AV log with action=quarantine.

D.

An AppControl log with action=blocked.

Full Access
Question # 13

Refer to the exhibit.

Based on the output, what can you conclude about the FortiAnalyzer logging status?

A.

The connection between FortiGate and FortiAnalyzer is overloaded.

B.

FortiGate has logs to send, but FortiAnalyzer is unavailable.

C.

FortiGate is configured to send logs in batches.

D.

FortiGate is sending logs again after it performed a reboot.

Full Access
Question # 14

Which two of the following must you configure on FortiAnalyzer to email a FortiAnalyzer report externally?

(Choose two.)

A.

Mail server

B.

Output profile

C.

SFTP server

D.

Report scheduling

Full Access
Question # 15

Which two statement are true regardless initial Logs sync and Log Data Sync for Ha on FortiAnalyzer?

A.

By default, Log Data Sync is disabled on all backup devise.

B.

Log Data Sync provides real-time log synchronization to all backup devices.

C.

With initial Logs Sync, when you add a unit to an HA cluster, the primary device synchronizes its logs with the backup device.

D.

When Logs Data Sync is turned on, the backup device will reboot and then rebuilt the log database with the synchronized logs.

Full Access
Question # 16

Which statement correctly describes the management extensions available on FortiAnalyzer?

A.

Management extensions do not require additional licenses.

B.

Management extensions allow FortiAnalyzer to act as a ForbSIEM supervisor.

C.

Management extensions require a dedicated VM for best performance.

D.

Management extensions may require a minimum number of CPU cores to run.

Full Access
Question # 17

Which two purposes does the auto cache setting on reports serve? (Choose two.)

A.

It automatically updates the hcache when new logs arrive.

B.

It provides diagnostics on report generation time.

C.

It reduces the log insert lag rate.

D.

It reduces report generation time.

Full Access
Question # 18

Which two settings must you configure on FortiAnalyzer to allow non-local administrators to authenticate to FortiAnalyzer with any user account in a single LDAP group? (Choose two.)

A.

A local wildcard administrator account

B.

A remote LDAP server

C.

A trusted host profile that restricts access to the LDAP group

D.

An administrator group

Full Access
Question # 19

Which tabs do not appear when FortiAnalyzer is operating in Collector mode?

A.

FortiView

B.

Event Management

C.

Device Manger

D.

Reporting

Full Access
Question # 20

Refer to the exhibit.

The exhibit shows the creation of a new administrator on FortiAnalyzer.

What are two effects of enabling the choice Match all users on remote server when configuring a new administrator? (Choose two.)

A.

It allows user accounts in the LDAP server to use two-factor authentication.

B.

It creates a wildcard administrator using an LDAP server.

C.

User Remote-Admin from the LDAP server will be able to log in to FortiAnalyzer at any time.

D.

Administrators can log in to FortiAnalyzer using their credentials on the remote LDAP server.

Full Access
Question # 21

What statements are true regarding FortiAnalyzer 's treatment of high availability (HA) dusters? (Choose two)

A.

FortiAnalyzer distinguishes different devices by their serial number.

B.

FortiAnalyzer receives logs from d devices in a duster.

C.

FortiAnalyzer receives bgs only from the primary device in the cluster.

D.

FortiAnalyzer only needs to know (he serial number of the primary device in the cluster-it automaticaly discovers the other devices.

Full Access
Question # 22

Logs are being deleted from one of the ADOMs earlier than the configured setting for archiving in the data

policy.

What is the most likely problem?

A.

CPU resources are too high

B.

Logs in that ADOM are being forwarded, in real-time, to another FortiAnalyzer device

C.

The total disk space is insufficient and you need to add other disk

D.

The ADOM disk quota is set too low, based on log rates

Full Access
Question # 23

What FortiView tool can you use to automatically build a dataset and chart based on a filtered search result?

A.

Chart Builder

B.

Export to Report Chart

C.

Dataset Library

D.

Custom View

Full Access
Question # 24

On FortiAnalyzer, what is a wildcard administrator account?

A.

An account that permits access to members of an LDAP group

B.

An account that allows guest access with read-only privileges

C.

An account that requires two-factor authentication

D.

An account that validates against any user account on a FortiAuthenticator

Full Access
Question # 25

View the exhibit.

Why is the total quota less than the total system storage?

A.

3.6% of the system storage is already being used.

B.

Some space is reserved for system use, such as storage of compression files, upload files, and temporary report files

C.

The oftpd process has not archived the logs yet

D.

The logfiled process is just estimating the total quota

Full Access
Question # 26

Refer to the exhibit.

What is the purpose of using the Chart Builder feature on FortiAnalyzer?

A.

In Log View, this feature allows you to build a dataset and chart automatically, based on the filtered search results.

B.

In Log View, this feature allows you to build a chart and chart automatically, on the top 100 log entries.

C.

This feature allows you to build a chart under FortiView.

D.

You can add charts to generated reports using this feature.

Full Access
Question # 27

You are trying to initiate an authorization request from FortiGate to FortiAnalyzer, but the Security Fabric window does not open when you click Authorize.

Which two reasons can cause this to happen? (Choose two.)

A.

A pre-shared key needs to be established on both sides.

B.

The management computer does not have connectivity to the authorization IP address and port combination.

C.

The Security Fabric root is unauthorized and needs to be added as a trusted host.

D.

The fabric authorization settings on FortiAnalyzer are misconfigured.

Full Access
Question # 28

The connection status of a new device on FortiAnalyzer is listed as Unauthorized.

What does that status mean?

A.

It is a device whose registration has not yet been accepted in FortiAnalvzer.

B.

It is a device that has not yet been assigned an ADOM.

C.

It is a device that is waiting for you to configure a pre-shared key.

D.

It is a device that FortiAnalvzer does not support.

Full Access
Question # 29

What is the best approach to handle a hard disk failure on a FortiAnalyzer that supports hardware RAID?

A.

There is no need to do anything because the disk will self-recover.

B.

Run execute format disk to format and restart the FortiAnalyzer device.

C.

Perform a hot swap of the disk.

D.

Shut down FortiAnalyzer and replace the disk.

Full Access
Question # 30

Refer to the exhibit.

The exhibit shows “remoteservergroup” is an authentication server group with LDAP and RADIUS servers.

Which two statements express the significance of enabling “Match all users on remote server” when configuring a new administrator? (Choose two.)

A.

It creates a wildcard administrator using LDAP and RADIUS servers.

B.

Administrator can log in to FortiAnalyzer using their credentials on remote servers LDAP and RADIUS.

C.

Use remoteadmin from LDAP and RADIUS servers will be able to log in to FortiAnalyzer at anytime.

D.

It allows administrators to use two-factor authentication.

Full Access
Question # 31

View the exhibit.

What does the data point at 14:35 tell you?

A.

FortiAnalyzer is dropping logs.

B.

FortiAnalyzer is indexing logs faster than logs are being received.

C.

FortiAnalyzer has temporarily stopped receiving logs so older logs’ can be indexed.

D.

The sqlplugind daemon is ahead in indexing by one log.

Full Access
Question # 32

Which statement is true about sending notifications with incident updates?

A.

Notifications can be sent only when an incident is updated or deleted.

B.

If you use multiple fabric connectors, all connectors must have the same notification settings

C.

Notifications can be sent only by email.

D.

You can send notifications to multiple external platforms

Full Access
Question # 33

An administrator has configured the following settings:

config system fortiview settings

set resolve-ip enable

end

What is the significance of executing this command?

A.

Use this command only if the source IP addresses are not resolved on FortiGate.

B.

It resolves the source and destination IP addresses to a hostname in FortiView on FortiAnalyzer.

C.

You must configure local DNS servers on FortiGate for this command to resolve IP addresses on Forti Analyzer.

D.

It resolves the destination IP address to a hostname in FortiView on FortiAnalyzer.

Full Access
Question # 34

When you perform a system backup, what does the backup configuration contain? (Choose two.)

A.

Generated reports

B.

Device list

C.

Authorized devices logs

D.

System information

Full Access
Question # 35

What is the main purpose of using an NTP server on FortiAnalyzer and all of its registered devices?

A.

Log correlation

B.

Host name resolution

C.

Log collection

D.

Real-time forwarding

Full Access
Question # 36

Which daemon is responsible for enforcing raw log file size?

A.

logfiled

B.

oftpd

C.

sqlplugind

D.

miglogd

Full Access
Question # 37

Which clause is considered mandatory in SELECT statements used by the FortiAnalyzer to generate reports?

A.

FROM

B.

LIMIT

C.

WHERE

D.

ORDER BY

Full Access
Question # 38

Which two methods can you use to restrict administrative access on FortiAnalyzer? (Choose two.)

A.

Configure trusted hosts.

B.

Limit access to specific virtual domains.

C.

Fabric connectors to external LDAP servers.

D.

Use administrator profiles.

Full Access
Question # 39

In Log View, you can use the Chart Builder feature to build a dataset and chart based on the filtered search results.

Similarly, which feature you can use for FortiView?

A.

Export to Report Chart

B.

Export to PDF

C.

Export to Chart Builder

D.

Export to Custom Chart

Full Access
Question # 40

What is the purpose of trigger variables?

A.

To display statistics about the playbook runtime

B.

To use information from the trigger to filter the action in a task

C.

To provide the trigger information to make the playbook start running

D.

To store the start times of playbooks with On_Schedule triggers

Full Access
Question # 41

Consider the CLI command:

What is the purpose of the command?

A.

To add a unique tag to each log to prove that it came from this FortiAnalyzer

B.

To add the MD5 hash value and authentication code

C.

To add a log file checksum

D.

To encrypt log communications

Full Access
Question # 42

Refer to the exhibit.

The capture displayed was taken on a FortiAnalyzer.

Why is a single IP address shown as the source for all logs received?

A.

FortiAnalyzer is using the device MAC addresses to differentiate their logs.

B.

The logs belong to devices that are part of a high availability (HA) cluster.

C.

FortiAnalyzer is receiving logs from the root FortiGate of a Security Fabric.

D.

The device sending logs has two VDOMs in the same ADOM.

Full Access
Question # 43

What happens when the IOC breach detection engine on FortiAnalyzer finds web logs that match a blocklisted IP address?

A.

The endpoint is marked as Compromised and. optionally, can be put in quarantine.

B.

FortiAnalyzer flags the associated host for further analysis.

C.

A new Infected entry is added for the corresponding endpoint.

D.

The detection engine classifies those logs as Suspicious

Full Access
Question # 44

Which statements are correct regarding FortiAnalyzer reports? (Choose two)

A.

FortiAnalyzer provides the ability to create custom reports.

B.

FortiAnalyzer glows you to schedule reports to run.

C.

FortiAnalyzer includes pre-defined reports only.

D.

FortiAnalyzer allows reporting for FortiGate devices only.

Full Access
Question # 45

Which statements are true regarding securing communications between FortiAnalyzer and FortiGate with SSL? (Choose two.)

A.

SSL is the default setting.

B.

SSL communications are auto-negotiated between the two devices.

C.

SSL can send logs in real-time only.

D.

SSL encryption levels are globally set on FortiAnalyzer.

E.

FortiAnalyzer encryption level must be equal to, or higher than, FortiGate.

Full Access
Question # 46

FortiAnalyzer reports are dropping analytical data from 15 days ago, even though the data policy setting for

analytics logs is 60 days.

What is the most likely problem?

A.

Quota enforcement is acting on analytical data before a report is complete

B.

Logs are rolling before the report is run

C.

CPU resources are too high

D.

Disk utilization for archive logs is set for 15 days

Full Access
Question # 47

Which two settings must you configure on FortiAnalyzer to allow non-local administrators to authenticate on FortiAnalyzer with any user account in a single LDAP group? (Choose two.)

A.

A local wildcard administrator account

B.

An administrator group

C.

One or more remote LDAP servers

D.

LDAP servers IP addresses added as trusted hosts

Full Access
Question # 48

Which statement is true regarding Macros on FortiAnalyzer?

A.

Macros are ADOM specific and each ADOM will have unique macros relevant to that ADOM.

B.

Macros are supported only on the FortiGate ADOM.

C.

Macros are useful in generating excel log files automatically based on the reports settings.

D.

Macros are predefined templates for reports and cannot be customized.

Full Access
Question # 49

What is the purpose of a dataset query in FortiAnalyzer?

A.

It sorts log data into tables

B.

It extracts the database schema

C.

It retrieves log data from the database

D.

It injects log data into the database

Full Access
Question # 50

You have recently grouped multiple FortiGate devices into a single ADOM. System Settings > Storage Info

shows the quota used.

What does the disk quota refer to?

A.

The maximum disk utilization for each device in the ADOM

B.

The maximum disk utilization for the FortiAnalyzer model

C.

The maximum disk utilization for the ADOM type

D.

The maximum disk utilization for all devices in the ADOM

Full Access
Question # 51

Refer to the exhibit.

Laptop1 is used by several administrators to manage FortiAnalyzer. You want to configure a generic text filter that matches all login attempts to the web interface generated by any user other than "admin", and coming from Laptop1.

Which filter will achieve the desired result?

A.

operation-login & dstip==10.1.1.210 & user!-admin

B.

operation-login & srcip==10.1.1.100 & dstip==10.1.1.210 & user==admin

C.

operation-login & performed_on=="GUI(10.1.1.210)" & user!=admin

D.

operation-login & performed_on=="GUI(10.1.1.100)" & user!=admin

Full Access
Question # 52

Which three RAID configurations provide fault tolerance on FortiAnalyzer? (Choose three.)

A.

RAIDO

B.

RAID 5

C.

RAID1

D.

RAID 6+0

E.

RAID 0+0

Full Access
Question # 53

What is the best approach to handle a hard disk failure on a FortiAnalyzer that supports hardware RAID?

A.

There is no need to do anything because the disk will self-recover.

B.

Run execute format disk to format and restart the FortiAnalyzer device.

C.

Perform a hot swap of the disk.

D.

Shut down FortiAnalyzer and replace the disk.

Full Access