New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FCP_FAZ_AN-7.6 Questions and Answers

Question # 6

Refer to Exhibit:

Client-1 is trying to access the internet for web browsing.

All FortiGate devices in the topology are part of a Security Fabric with logging to FortiAnalyzer configured. All firewall policies have logging enabled. All web filter profiles are configured to log only violations.

Which statement about the logging behavior for this specific traffic flow is true?

A.

Only FGT-B will create traffic logs.

B.

FGT-B will see the MAC address of FGT-A as the destination and notifies FGT-A to log this flow.

C.

FGT B will create traffic logs and will create web filter logs if it detects a violation.

D.

Only FGT-A will create web filter logs if it detects a violation.

Full Access
Question # 7

After a generated a repot, you notice the information you were expecting to see in not included in it. However, you confirm that the logs are there:

Which two actions should you perform? (Choose two.)

A.

Check the time frame covered by the report.

B.

Disable auto-cache.

C.

Increase the report utilization quota.

D.

Test the dataset.

Full Access
Question # 8

As part of your analysis, you discover that a Medium severity level incident is fully remediated.

You change the incident status to Closed:Remediated.

Which statement about your update is true?

A.

The incident can no longer be deleted.

B.

The corresponding event will be marked as Mitigated.

C.

The incident dashboard will be updated.

D.

The incident severity will be lowered.

Full Access
Question # 9

When managing incidents on FortiAnlyzer, what must an analyst be aware of?

A.

You can manually attach generated reports to incidents.

B.

The status of the incident is always linked to the status of the attach event.

C.

Severity incidents rated with the level High have an initial service-level agreement (SLA) response time of 1 hour.

D.

Incidents must be acknowledged before they can be analyzed.

Full Access
Question # 10

(When there are no matching parsers for a device log, what does FortiAnalyzer do? (Choose one answer))

A.

Drops the log

B.

Applies the generic SYSLOG parser

C.

Stores the log but doesn’t normalize it

D.

Archives the log for future analysis

Full Access
Question # 11

What is the purpose of playbook trigger variables?

A.

To display statistics about the playbook runtime

B.

To use information from the trigger to filter the action in a task

C.

To provide the trigger information to make the playbook start running

D.

To store the start the times of playbooks with On_Schedule triggers

Full Access
Question # 12

You find that as part of your role as an analyst, you frequently search log View using the same parameters.

Instead of defining your search filters repeatedly, what can you do to save time?

A.

Configure a custom dashboard.

B.

Configure a custom view.

C.

Configure a data selector.

D.

Configure a marco and apply it to device groups.

Full Access
Question # 13

Refer to the exhibit with partial output:

Your colleagueexported a playbook and has sent it to you for review. You open the file in a text editor and observer the output as shown in the exhibit.

Which statement about the export is true?

A.

The export data type is zipped.

B.

The playbook is misconfigured.

C.

The option to include the connector was not selected.

D.

Your colleague put a password on the export.

Full Access
Question # 14

Exhibit.

What is the purpose of using the Chart Builder feature On FortiAnalyzer?

A.

To build a chart automatically based on the top 100 log entries

B.

To add charts directly to generatereports in the current ADOM.

C.

To add a new chart under FortiView to be used in new reports

D.

To build a dataset and chart based on the filtered search results

Full Access
Question # 15

Which two statements about playbook execution are true? (Choose two)

A.

FortiAnalyzer will not commit changes made by a Failed playbook

B.

The Playbook Monitor provides troubleshooting logs

C.

You can run the default debugging playbook to investigate playbook errors.

D.

Even I the playbook status is Failed, individual tasks may have succeeded.

Full Access
Question # 16

Exhibit.

Assume these are all the events that exist on the FortiAnalyzer device.

How many events will be added to the incident created after running this playbook?

A.

Eleven events will be added.

B.

Seven events will beadded

C.

No events will be added.

D.

Four events will be added.

Full Access
Question # 17

Exhibit.

Which statement about the event displayed is correct?

A.

The risk source is isolated.

B.

The security risk was blocked or dropped.

C.

The security event risk is considered open.

D.

An incident was created from this event.

Full Access
Question # 18

Which two actions should an administrator take to vide Compromised Hosts on FortiAnalyzer? (Choose two.)

A.

Enable device detection on the FotiGate device that are sending logs to FortiAnalyzer.

B.

Enable web filtering in firewall policies on FortiGate devices, and make sure these logs are sent to fortiAnalyzer.

C.

Make sure all endpoints are reachable by FortiAnalyzer.

D.

Subscribe FortiAnalyzer to FortiGuard to keep its local threat database up to date.

Full Access
Question # 19

(Refer to the exhibit.

Which statement about the displayed event is correct? (Choose one answer))

A.

The security risk was dropped.

B.

The risk source is isolated.

C.

The security risk was blocked.

D.

The security event risk is from an application control log.

Full Access
Question # 20

Which statement regarding macros on FortiAnalyzer is true?

A.

Macros are predefined templates for reports and cannot be customized.

B.

Macros are useful in generating excel log files automatically based on the report settings.

C.

Macros are ADOM-specific and each ADOM type have unique macros relevant to that ADOM.

D.

Macros are supported only on the FortiGate ADOMs.

Full Access