Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Fortinet NSE7_SOC_AR-7.6 Fortinet NSE 7 - Security Operations 7.6 Architect Exam Practice Test

Demo: 17 questions
Total 57 questions

Fortinet NSE 7 - Security Operations 7.6 Architect Questions and Answers

Question 1

A customer wants FortiAnalyzer to run an automation stitch that executes a CLI command on FortiGate to block a predefined list of URLs, if a botnet command-and-control (C&C) server IP is detected.

Which FortiAnalyzer feature must you use to start this automation process?

Options:

A.

Playbook

B.

Data selector

C.

Event handler

D.

Connector

Question 2

Which three statements accurately describe step utilities in a playbook step? (Choose three answers)

Options:

A.

The Timeout step utility sets a maximum execution time for the step and terminates playbook execution if exceeded.

B.

The Loop step utility can only be used once in each playbook step.

C.

The Variables step utility stores the output of the step directly in the step itself.

D.

The Condition step utility behavior changes depending on if a loop exists for that step.

E.

The Mock Output step utility uses HTML format to simulate real outputs.

Question 3

When configuring a FortiAnalyzer to act as a collector device, which two steps must you perform? (Choose two.)

Options:

A.

Enable log compression.

B.

Configure log forwarding to a FortiAnalyzer in analyzer mode.

C.

Configure the data policy to focus on archiving.

D.

Configure Fabric authorization on the connecting interface.

Question 4

Exhibit:

Which observation about this FortiAnalyzer Fabric deployment architecture is true?

Options:

A.

The AMER HQ SOC team cannot run automation playbooks from the Fabric supervisor.

B.

The AMER HQ SOC team must configure high availability (HA) for the supervisor node.

C.

The EMEA SOC team has access to historical logs only.

D.

The APAC SOC team has access to FortiView and other reporting functions.

Question 5

Refer to the exhibits.

Assume that the traffic flows are identical, except for the destination IP address. There is only one FortiGate in network address translation (NAT) mode in this environment.

Based on the exhibits, which two conclusions can you make about this FortiSIEM incident? (Choose two answers)

Options:

A.

The client 10.200.3.219 is conducting active reconnaissance.

B.

FortiGate is not routing the packets to the destination hosts.

C.

The destination hosts are not responding.

D.

FortiGate is blocking the return flows.

Question 6

Which two playbook triggers enable the use of trigger events in later tasks as trigger variables? (Choose two.)

Options:

A.

EVENT

B.

INCIDENT

C.

ON SCHEDULE

D.

ON DEMAND

Question 7

Refer to the exhibit,

which shows the partial output of the MITRE ATT&CK Enterprise matrix on FortiAnalyzer.

Which two statements are true? (Choose two.)

Options:

A.

There are four techniques that fall under tactic T1071.

B.

There are four subtechniques that fall under technique T1071.

C.

There are event handlers that cover tactic T1071.

D.

There are 15 events associated with the tactic.

Question 8

Which two types of variables can you use in playbook tasks? (Choose two.)

Options:

A.

input

B.

Output

C.

Create

D.

Trigger

Question 9

Refer to the exhibit.

You are reviewing the Triggering Events page for a FortiSIEM incident. You want to remove the Reporting IP column because you have only one firewall in the topology. How do you accomplish this? (Choose one answer)

Options:

A.

Clear the Reporting IP field from the Triggered Attributes section when you configure the Incident Action.

B.

Disable correlation for the Reporting IP field in the rule subpattern.

C.

Remove the Reporting IP attribute from the raw logs using parsing rules.

D.

Customize the display columns for this incident.

Question 10

Refer to the exhibits.

You configured a spearphishing event handler and the associated rule. However. FortiAnalyzer did not generate an event.

When you check the FortiAnalyzer log viewer, you confirm that FortiSandbox forwarded the appropriate logs, as shown in the raw log exhibit.

What configuration must you change on FortiAnalyzer in order for FortiAnalyzer to generate an event?

Options:

A.

In the Log Type field, change the selection to AntiVirus Log(malware).

B.

Configure a FortiSandbox data selector and add it tothe event handler.

C.

In the Log Filter by Text field, type the value: .5 ub t ype ma Iwa re..

D.

Change trigger condition by selecting. Within a group, the log field Malware Kame (mname> has 2 or more unique values.

Question 11

You are trying to create a playbook that creates a manual task showing a list of public IPv6 addresses. You were successful in extracting all IP addresses from a previous action into a variable calledip_list, which contains both private and public IPv4 and IPv6 addresses. You must now filter the results to display only public IPv6 addresses. Which two Jinja expressions can accomplish this task? (Choose two answers)

Options:

A.

{{ vars.ip_list | ipv6addr('public') }}

B.

{{ vars.ip_list | ipaddr('public') | ipv6 }}

C.

{{ vars.ip_list | ipaddr('!private') | ipv6 }}

D.

{{ vars.ip_list | ipv6 | ipaddr('public') }}

Question 12

When you use a manual trigger to save user input as a variable, what is the correct Jinja expression to reference the variable? (Choose one answer)

Options:

A.

{{ vars.input.params. }}

B.

{{ globalVars. }}

C.

{{ vars.item. }}

D.

{{ vars.steps. }}

Question 13

Which three are threat hunting activities? (Choose three answers)

Options:

A.

Enrich records with threat intelligence.

B.

Automate workflows.

C.

Generate a hypothesis.

D.

Perform packet analysis.

E.

Tune correlation rules.

Question 14

Refer to the exhibit.

Which two options describe how the Update Asset and Identity Database playbook is configured? (Choose two.)

Options:

A.

The playbook is using a local connector.

B.

The playbook is using a FortiMail connector.

C.

The playbook is using an on-demand trigger.

D.

The playbook is using a FortiClient EMS connector.

Question 15

Review the following incident report:

Attackers leveraged a phishing email campaign targeting your employees.

The email likely impersonated a trusted source, such as the IT department, and requested login credentials.

An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).

The RAT provided the attackers with remote access and a foothold in the compromised system.

Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)

Options:

A.

Initial Access

B.

Defense Evasion

C.

Lateral Movement

D.

Persistence

Question 16

Refer to the exhibit.

You must configure the FortiGate connector to allow FortiSOAR to perform actions on a firewall. However, the connection fails. Which two configurations are required? (Choose two answers)

Options:

A.

Trusted hosts must be enabled and the FortiSOAR IP address must be permitted.

B.

The VDOM name must be specified, or set to VDOM_1, if VDOMs are not enabled on FortiGate.

C.

HTTPS must be enabled on the FortiGate interface that FortiSOAR will communicate with.

D.

An API administrator must be created on FortiGate with the appropriate profile, along with a generated API key to configure on the connector.

Question 17

According to the National Institute of Standards and Technology (NIST) cybersecurity framework, incident handling activities can be divided into phases.

In which incident handling phase do you quarantine a compromised host in order to prevent an adversary from using it as a stepping stone to the next phase of an attack?

Options:

A.

Containment

B.

Analysis

C.

Eradication

D.

Recovery

Demo: 17 questions
Total 57 questions