Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Fortinet > Fortinet Network Security Expert > FCP_FAZ_AD-7.4

FCP_FAZ_AD-7.4 FCP - FortiAnalyzer 7.4 Administrator Question and Answers

Question # 4

You crested a playbook on FortiAnalyzer that uses a FortiOS connector

When configuring the FortiGate side, which type of trigger must be used so that the actions in an automation stitch are available in the FortiOS connector?

A.

FortiAnalyzer Event Handler

B.

Incoming webhook

C.

FortiOS Event Log

D.

Fabric Connector event

Full Access
Question # 5

Which two parameters are used to calculate the Total Quota value available on FortiAnalyzer? (Choose two.)

A.

Used storage

B.

Retention policy

C.

Reserved space

D.

Total system storage

Full Access
Question # 6

What can you do on FortiAnalyzer to restrict administrative access from specific locations?

A.

Configure trusted hosts for that administrator.

B.

Enable geo-location services on accessible interface.

C.

Configure two-factor authentication with a remote RADIUS server.

D.

Configure an ADOM for respective location.

Full Access
Question # 7

Which statement describes online logs on FortiAnalyzer?

A.

Logs that reached a specific size and were rolled over

B.

Logs that can be used to create reports

C.

Logs that can be viewed using Log Browse

D.

Logs that are saved to disk, compressed, and available in FortiView

Full Access
Question # 8

An administrator has moved FortiGate A from the root ADOM to ADOM1.

Which two statements are true regarding logs? (Choose two.)

A.

Analytics logs will be moved to ADOM1 from the root ADOM automatically.

B.

Archived logs will be moved to ADOM1 from the root ADOM automatically.

C.

Logs will be presented in both ADOMs immediately after the move.

D.

Analytics logs will be moved to ADOM1 from the root ADOM after you rebuild the ADOM1 SQL database.

Full Access
Question # 9

How does FortiAnalyzer retrieve specific log data from the database?

A.

SQL FROM statement

B.

SQL GET statement

C.

SQL SELECT statement

D.

SQL EXTRACT statement

Full Access
Question # 10

Refer to the exhibit.

What is the purpose of configuring FortiAnalyzer with the settings displayed in the image?

A.

To increase reliability

B.

To expand bandwidth

C.

To maximize resiliency

D.

To improve security

Full Access
Question # 11

After you have moved a registered logging device out of one ADOM and into a new ADOM, what is the

purpose of running the following CLI command?

execute sql-local rebuild-adom

A.

To reset the disk quota enforcement to default

B.

To remove the analytics logs of the device from the old database

C.

To migrate the archive logs to the new ADOM

D.

To populate the new ADOM with analytical logs for the moved device, so you can run reports

Full Access
Question # 12

What are analytics logs on FortiAnalyzer?

A.

Log type Traffic logs.

B.

Logs that roll over when the log file reaches a specific size.

C.

Logs that are indexed and stored in the SQL.

D.

Raw logs that are compressed and saved to a log file.

Full Access
Question # 13

Refer to the exhibit.

Which two statements are true regarding enabling auto-cache on FortiAnalyzer? (Choose two.)

A.

Report size will be optimized to conserve disk space on FortiAnalyzer.

B.

Reports will be cached in the memory.

C.

This feature is automatically enabled for scheduled reports.

D.

Enabling auto-cache reduces report generation time for reports that require a long time to assemble datasets.

Full Access
Question # 14

What is the purpose of a predefined template on the FortiAnalyzer?

A.

It can be edited and modified as required

B.

It specifies the report layout which contains predefined texts, charts, and macros

C.

It specifies report settings which contains time period, device selection, and schedule

D.

It contains predefined data to generate mock reports

Full Access
Question # 15

Which two statements about FortiAnalyzer operating modes are true? (Choose two.)

A.

When in collector mode, FortiAnalyzer offloads the log receiving task to the analyzer.

B.

When in analyzer mode, FortiAnalyzer supports event management and reporting features.

C.

For the collector, you should allocate most of the disk space to analytics logs.

D.

Analyzer mode is the default operating mode.

Full Access
Question # 16

Refer to the exhibit.

Based on the partial outputs displayed, which devices can be members of a FortiAnalyzer Fabric?

A.

FortiAnalyzer1 and FortiAnalyzer3

B.

All devices listed can be members.

C.

FortiAnalyzer1 and FortiAnalyzer2

D.

FortiAnalyzer2 and FortiAnalyzer3

Full Access
Question # 17

What is the best approach to handle a hard disk failure on a FortiAnalyzer that supports hardware RAID?

A.

There is no need to do anything because the disk will self-recover.

B.

Run execute format disk to format and restart the FortiAnalyzer device.

C.

Perform a hot swap of the disk.

D.

Shut down FortiAnalyzer and replace the disk.

Full Access
Question # 18

How can you attach a report to an incident?

A.

By attaching it to an event handler alert

B.

By editing the settings of the desired report

C.

From the properties of an existing incident

D.

Saving it in JSON format, and then importing it

Full Access
Question # 19

What does the disk status Degraded mean for RAID management?

A.

The hard drive is no longer being used by the RAID controller.

B.

One or more drives are missing from the FortiAnalyzer unit.

C.

The device is writing data to the disk to restore the volume to an optimal state.

D.

FortiAnalyzer determined that the parity data in the disk is not valid.

Full Access
Question # 20

Which statement is true regarding Macros on FortiAnalyzer?

A.

Macros are ADOM specific and each ADOM will have unique macros relevant to that ADOM.

B.

Macros are supported only on the FortiGate ADOM.

C.

Macros are useful in generating excel log files automatically based on the reports settings.

D.

Macros are predefined templates for reports and cannot be customized.

Full Access
Question # 21

What are two advantages of setting up fabric ADOM? (Choose two.)

A.

It can be used for fast data processing and log correlation

B.

It can be used to facilitate communication between devices in same Security Fabric

C.

It can include all Fortinet devices that are part of the same Security Fabric

D.

It can include only FortiGate devices that are part of the same Security Fabric

Full Access
Question # 22

What is the recommended method of expanding disk space on a FortiAnalyzer VM?

A.

From the VM host manager, add an additional virtual disk and use the #execute lvm extend command to expand the storage

B.

From the VM host manager, expand the size of the existing virtual disk

C.

From the VM host manager, expand the size of the existing virtual disk and use the # execute format disk command to reformat the disk

D.

From the VM host manager, add an additional virtual disk and rebuild your RAID array

Full Access
Question # 23

Which statements are true regarding securing communications between FortiAnalyzer and FortiGate with SSL? (Choose two.)

A.

SSL is the default setting.

B.

SSL communications are auto-negotiated between the two devices.

C.

SSL can send logs in real-time only.

D.

SSL encryption levels are globally set on FortiAnalyzer.

E.

FortiAnalyzer encryption level must be equal to, or higher than, FortiGate.

Full Access
Question # 24

An administrator, fortinet, can view logs and perform device management tasks, such as adding and removing registered devices. However, administrator fortinet is not able to create a mail server that can be used to send alert emails.

What can be the problem?

A.

ADOM mode is configured with Advanced mode.

B.

A trusted host is configured.

C.

fortinet is assigned the default Standard_User administrative profile.

D.

fortinet is assigned the default Restricted_User administrative profile.

Full Access
Question # 25

Which statement when you are upgrading the firmware on an HA cluster made up of three FortiAnalyzer devices is true?

A.

You can perform the firmware upgrade using only a console connection.

B.

All FortiAnalyzer devices will be upgraded at the same time.

C.

Enabling uninterruptible-upgrade prevents normal operations from being interrupted during the upgrade.

D.

First, upgrade the secondary devices, and then upgrade the primary device.

Full Access
Question # 26

What FortiView tool can you use to automatically build a dataset and chart based on a filtered search result?

A.

Chart Builder

B.

Export to Report Chart

C.

Dataset Library

D.

Custom View

Full Access
Question # 27

Which three RAID configurations provide fault tolerance on FortiAnalyzer? (Choose three.)

A.

RAIDO

B.

RAID 5

C.

RAID1

D.

RAID 6+0

E.

RAID 0+0

Full Access
Question # 28

How do you restrict an administrator’s access to a subset of your organization’s ADOMs?

A.

Set the ADOM mode to Advanced

B.

Assign the ADOMs to the administrator’s account

C.

Configure trusted hosts

D.

Assign the default Super_User administrator profile

Full Access
Question # 29

What are offline logs on FortiAnalyzer?

A.

Compressed logs, also known as archive logs

B.

Logs that are indexed and stored in the SQL database

C.

Any logs collected from offline devices after they boot up

D.

Real-time logs that are not yet indexed

Full Access
Question # 30

In Log View, you can use the Chart Builder feature to build a dataset and chart based on the filtered search results.

Similarly, which feature you can use for FortiView?

A.

Export to Report Chart

B.

Export to PDF

C.

Export to Chart Builder

D.

Export to Custom Chart

Full Access
Question # 31

Refer to the exhibit.

Laptop1 is used by several administrators to manage FortiAnalyzer. You want to configure a generic text filter that matches all login attempts to the web interface generated by any user other than "admin", and coming from Laptop1.

Which filter will achieve the desired result?

A.

operation-login & dstip==10.1.1.210 & user!-admin

B.

operation-login & srcip==10.1.1.100 & dstip==10.1.1.210 & user==admin

C.

operation-login & performed_on=="GUI(10.1.1.210)" & user!=admin

D.

operation-login & performed_on=="GUI(10.1.1.100)" & user!=admin

Full Access
Question # 32

On FortiAnalyzer, what is a wildcard administrator account?

A.

An account that permits access to members of an LDAP group

B.

An account that allows guest access with read-only privileges

C.

An account that requires two-factor authentication

D.

An account that validates against any user account on a FortiAuthenticator

Full Access
Question # 33

Which two statements are true regarding log fetching on FortiAnalyzer? (Choose two.)

A.

A FortiAnalyzer device can perform either the fetch server or client role, and it can perform two roles at the same time with the same FortiAnalyzer devices at the other end.

B.

Log fetching can be done only on two FortiAnalyzer devices that are running the same firmware version.

C.

Log fetching allows the administrator to fetch analytics logs from another FortiAnalyzer for redundancy.

D.

Log fetching allows the administrator to run queries and reports against historical data by retrieving archived logs from one FortiAnalyzer device and sending them to another FortiAnalyzer device.

Full Access
Question # 34

An administrator has moved FortiGate A from the root ADOM to ADOM1. However, the administrator is not able to generate reports for FortiGate A in ADOM1.

What should the administrator do to solve this issue?

A.

Use the execute sql-local rebuild-db command to rebuild all ADOM databases.

B.

Use the execute sql-local rebuild-adom ADOM1 command to rebuild the ADOM database.

C.

Use the execute sql-report run ADOM1 command to run a report.

D.

Use the execute sql-local rebuild-adom root command to rebuild the ADOM database.

Full Access
Question # 35

Refer to the exhibit.

Based on the partial outputs displayed, which devices can be members of a FortiAnalyzer Fabric?

A.

FortiAnalyzerl and FortiAnalyzer3

B.

FortiAnalyzer1 and FortiAnalyzer2

C.

All devices listed can be members

D.

FortiAnalyzer2 and FortiAnalyzer3

Full Access
Question # 36

Which two elements are contained in a system backup created on FortiAnalyzer? (Choose two.)

A.

Logs from registered devices

B.

Database snapshot

C.

Report information

D.

System information

Full Access
Question # 37

Which FortiAnalyzer feature allows you to retrieve the archived logs matching a specific timeframe from

another FortiAnalyzer device?

A.

Log upload

B.

Indicators of Compromise

C.

Log forwarding an aggregation mode

D.

Log fetching

Full Access
Question # 38

How can you configure FortiAnalyzer to permit administrator logins from only specific locations?

A.

Use static routes

B.

Use administrative profiles

C.

Use trusted hosts

D.

Use secure protocols

Full Access
Question # 39

Refer to the exhibit.

The capture displayed was taken on a FortiAnalyzer.

Why is a single IP address shown as the source for all logs received?

A.

FortiAnalyzer is using the device MAC addresses to differentiate their logs.

B.

The logs belong to devices that are part of a high availability (HA) cluster.

C.

FortiAnalyzer is receiving logs from the root FortiGate of a Security Fabric.

D.

The device sending logs has two VDOMs in the same ADOM.

Full Access
Question # 40

Which two statements express the advantages of grouping similar reports? (Choose two.)

A.

Improve report completion time.

B.

Conserve disk space on FortiAnalyzer by grouping multiple similar reports.

C.

Reduce the number of hcache tables and improve auto-hcache completion time.

D.

Provides a better summary of reports.

Full Access
Question # 41

What are two of the key features of FortiAnalyzer? (Choose two.)

A.

Centralized log repository

B.

Cloud-based management

C.

Reports

D.

Virtual domains (VDOMs)

Full Access
Question # 42

For which two purposes would you use the command set log checksum? (Choose two.)

A.

To help protect against man-in-the-middle attacks during log upload from FortiAnalyzer to an SFTP server

B.

To prevent log modification or tampering

C.

To encrypt log communications

D.

To send an identical set of logs to a second logging server

Full Access
Question # 43

Which statement correctly describes the management extensions available on FortiAnalyzer?

A.

Management extensions do not require additional licenses.

B.

Management extensions allow FortiAnalyzer to act as a ForbSIEM supervisor.

C.

Management extensions require a dedicated VM for best performance.

D.

Management extensions may require a minimum number of CPU cores to run.

Full Access
Question # 44

By default, what happens when a log file reaches its maximum file size?

A.

FortiAnalyzer overwrites the log files.

B.

FortiAnalyzer stops logging.

C.

FortiAnalyzer rolls the active log by renaming the file.

D.

FortiAnalyzer forwards logs to syslog.

Full Access
Question # 45

What happens when the IOC breach detection engine on FortiAnalyzer finds web logs that match a blocklisted IP address?

A.

The endpoint is marked as Compromised and. optionally, can be put in quarantine.

B.

FortiAnalyzer flags the associated host for further analysis.

C.

A new Infected entry is added for the corresponding endpoint.

D.

The detection engine classifies those logs as Suspicious

Full Access
Question # 46

Why must you wait for several minutes before you run a playbook that you just created?

A.

FortiAnalyzer needs that time to parse the new playbook.

B.

FortiAnalyzer needs that time to back up the current playbooks.

C.

FortiAnalyzer needs that time to ensure there are no other playbooks running.

D.

FortiAnalyzer needs that time to debug the new playbook.

Full Access
Question # 47

Which two methods can you use to restrict administrative access on FortiAnalyzer? (Choose two.)

A.

Configure trusted hosts.

B.

Limit access to specific virtual domains.

C.

Fabric connectors to external LDAP servers.

D.

Use administrator profiles.

Full Access
Question # 48

Refer to the exhibit.

Based on the output, what can you conclude about the FortiAnalyzer logging status?

A.

The connection between FortiGate and FortiAnalyzer is overloaded.

B.

FortiGate has logs to send, but FortiAnalyzer is unavailable.

C.

FortiGate is configured to send logs in batches.

D.

FortiGate is sending logs again after it performed a reboot.

Full Access
Question # 49

What can the CLI command # diagnose test application oftpd 3 help you to determine?

A.

What devices and IP addresses are connecting to FortiAnalyzer

B.

What logs, if any, are reaching FortiAnalyzer

C.

What ADOMs are enabled and configured

D.

What devices are registered and unregistered

Full Access
Question # 50

Which statements are true of Administrative Domains (ADOMs) in FortiAnalyzer? (Choose two.)

A.

ADOMs are enabled by default.

B.

ADOMs constrain other administrator’s access privileges to a subset of devices in the device list.

C.

Once enabled, the Device Manager, FortiView, Event Management, and Reports tab display per ADOM.

D.

All administrators can create ADOMs--not just the admin administrator.

Full Access
Question # 51

Which SQL query is in the correct order to query the database in the FortiAnslyzer?

A.

SELECT devid FROM Slog GROOP BY devid WHERE * user' =* USERl'

B.

SELECT devid WHERE 'u3er'='USERl' FROM $ log GROUP BY devid

C.

SELECT devid FROM Slog- WHERE *user' =' USERl' GROUP BY devid

D.

FROM Slog WHERE 'user* =' USERl' SELECT devid GROUP BY devid

Full Access