Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > Fortinet Certified Solution Specialist > FCSS_ADA_AR-6.7

FCSS_ADA_AR-6.7 FCSS Advanced Analytics 6.7 Architect Question and Answers

Question # 4

What happens to events that the collector receives when there is a WAN link failure between the collector and the supervisor?

A.

Events are buffered for up to 24 hours.

B.

Events are buffered up to 10 MB before compression.

C.

Events are buffered up to 10.000 logs.

D.

Events are buffered up to 1 GB after compression.

Full Access
Question # 5

A service provider purchased a 500-EPS license and configured a new collector with 100 EPS for customer A, and another collector with 200 EPS for customer B.

How much is in the remaining EPS pool for future customers and for MSSP itself?

A.

30

B.

200

C.

100

D.

50

Full Access
Question # 6

Refer to the exhibit.

An administrator applies the rule exception shown in the exhibit.

How does this configuration impact the incident generation for that rule?

A.

Incidents will not be generated during the specified period.

B.

Incidents will be generated only during the specified period.

C.

Incidents will be generated without triggering an email alert during the specified period.

D.

Events will not be processed by the rule during the specified period.

Full Access
Question # 7

From where does the rule engine load the baseline data values?

A.

The memory

B.

The profile report

C.

The profile database

D.

The daily database

Full Access
Question # 8

Why can collectorsnotbe defined before the worker upload address is set on the supervisor?

A.

Collectors receive the worker upload address during the registration process

B.

To ensure that the service provider has deployed a NFS server

C.

Collectors can only upload data to a worker, and the supervisor is not a worker

D.

To ensure that the service provider has deployed at least one worker along with a supervisor

Full Access
Question # 9

Why do collectors communicate with the Supervisor after registration? (Choose two.)

A.

To receive templates associated with agents

B.

To report the health status of the agents

C.

To upload event data if a worker down

D.

To report its own health status

Full Access
Question # 10

Refer to the exhibit.

Which workers are assigned tasks for the query ID13127? (Choose two.)

A.

Worker1 has no tasks for query ID 13127*.

B.

Worker1 has one task for query ID 13127*.

C.

Worker2 has two tasks for query ID 13127*.

D.

Worker3 has four tasks for query ID 13127*.

E.

Worker3 has two tasks for query ID 13127*.

Full Access
Question # 11

FortiSIEM provides all rules with the ability to automatically change an active incident status to auto-cleared, based on an extra set of defined criteria.

Why would you configure FortiSIEM to automatically change an active incident status to auto-cleared?

A.

Because availability or performance-related problems may trigger a threshold temporarily.

B.

Because too many active incidents can spike the resource usaqe on FortiSIEM.

C.

Because you need a way to reduce a backlog of incident responses.

D.

Because some security-related incidents occur on a temporary basis.

Full Access
Question # 12

In a customer network that includes a collector, which device performs device discoveries?

A.

Agent

B.

Supervisor

C.

Worker

D.

Collector

Full Access
Question # 13

Refer to the exhibit.

Consider a custom lookup tableMalwareIPList. An analyst constructed an analytic query to reference theMalwareIPListlookup table.

What is the outcome of the analytic query?

A.

The IP address from permitted traffic with a confidence score of 98 is displayed.

B.

The analyst receives an error because the LookupTableGet function can be used only in display filters to enrich data.

C.

The value for the LookupTableGet function in the analytic search can be either true or false.

D.

The permitted traffic IP address from the Phishing category is displayed.

Full Access
Question # 14

Where are the SQLite databases that are used for the baselining, stored?

A.

/opt/phoenix/cache

B.

/opt/phoenix/bin

C.

/opt/phoenix/config

D.

/opt/phoenix/delta

Full Access
Question # 15

How can you invoke an integration policy on FortiSIEM rules?

A.

Through Notification Policy settings

B.

Through External Authentication settings

C.

Through Incident Notification settings

D.

Through remediation scripts

Full Access
Question # 16

How can you customize the AI model on FortiSIEM?

A.

Retrain the AI model

B.

Reconfigure UEBA rules

C.

Adjust risk weighting for UEBA tags

D.

Adjust number of samples collected by the UEBA agents

Full Access
Question # 17

Which two statements about phRuleWorker are true? (Choose two.)

A.

phRuleWorker uses a 60-second bucket as an evaluation window.

B.

phRuleWorker evaluates non-aggregate conditions as defined in subpattern filters of a rule in memory.

C.

phRuleWorker exists on both the supervisor and workers.

D.

phRuleWorker exists on the worker only.

Full Access