New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NSE7_SOC_AR-7.6 Questions and Answers

Question # 6

Refer to the exhibits.

The Malicious File Detect playbook is configured to create an incident when an event handler generates a malicious file detection event.

Why did the Malicious File Detect playbook execution fail?

A.

The Create Incident task was expecting a name or number as input, but received an incorrect data format

B.

The Get Events task did not retrieve any event data.

C.

The Attach_Data_To_lncident incident task wasexpecting an integer, but received an incorrect data format.

D.

The Attach Data To Incident task failed, which stopped the playbook execution.

Full Access
Question # 7

Refer to the exhibit. What is the correct Jinja expression to filter the results to show only the MD5 hash values?

{{ [slot 1] | [slot 2] [slot 3].[slot 4] }}

Select the Jinja expression in the left column, hold and drag it to a blank position on the right. Place the four correct steps in order, placing the first step in the first slot.

Full Access
Question # 8

Refer to the exhibit.

Which method most effectively reduces the attack surface of this organization? (Choose one answer)

A.

Forward all firewall logs to the security information and event management (SIEM) system.

B.

Enable deep inspection on firewall policies.

C.

Implement macrosegmentation.

D.

Remove unused devices.

Full Access
Question # 9

Refer to Exhibit:

A SOC analyst is creating the Malicious File Detected playbook to run when FortiAnalyzer generates a malicious file event. The playbook must also update the incident with the malicious file event data.

What must the next task in this playbook be?

A.

A local connector with the action Update Asset and Identity

B.

A local connector with the action Attach Data to Incident

C.

A local connector with the action Run Report

D.

A local connector with the action Update Incident

Full Access
Question # 10

Which two ways can you create an incident on FortiAnalyzer? (Choose two.)

A.

Using a connector action

B.

Manually, on the Event Monitor page

C.

By running a playbook

D.

Using a custom event handler

Full Access
Question # 11

Which of the following are critical when analyzing and managing events and incidents in a SOC? (Choose two answers)

A.

Accurate detection of threats

B.

Immediate escalation for all alerts

C.

Rapid identification of false positives

D.

Periodic system downtime for maintenance

Full Access
Question # 12

Review the incident report:

Packet captures show a host maintaining periodic TLS sessions that imitate normal HTTPS traffic but run on TCP 8443 to a single external host. An analyst flags the traffic as potential command-and-control. During the same period, the host issues frequent DNS queries with oversized TXT payloads to an attacker-controlled domain, transferring staged files.

Which two MITRE ATT&CK techniques best describe this activity? (Choose two answers)

A.

Non-Standard Port

B.

Exploitation of Remote Services

C.

Exfiltration Over Alternative Protocol

D.

Hide Artifacts

Full Access
Question # 13

Exhibit:

Which observation about this FortiAnalyzer Fabric deployment architecture is true?

A.

The AMER HQ SOC team cannot run automation playbooks from the Fabric supervisor.

B.

The AMER HQ SOC team must configure high availability (HA) for the supervisor node.

C.

The EMEA SOC team has access to historical logs only.

D.

The APAC SOC team has access to FortiView and other reporting functions.

Full Access
Question # 14

Which three end user logs does FortiAnalyzer use to identify possible IOC compromised hosts? (Choose three.)

A.

Email filter logs

B.

DNS filter logs

C.

Application filter logs

D.

IPS logs

E.

Web filter logs

Full Access
Question # 15

Which statement best describes the MITRE ATT&CK framework?

A.

It provides a high-level description of common adversary activities, but lacks technical details

B.

It covers tactics, techniques, and procedures, but does not provide information about mitigations.

C.

It describes attack vectors targeting network devices and servers, but not user endpoints.

D.

It contains some techniques or subtechniques that fall under more than one tactic.

Full Access
Question # 16

What are three capabilities of the built-in FortiSOAR Jinja editor? (Choose three answers)

A.

It renders output by combining Jinja expressions and JSON input.

B.

It checks the validity of a Jinja expression.

C.

It creates new records in bulk.

D.

It loads the environment JSON of a recently executed playbook.

E.

It defines conditions to trigger a playbook step.

Full Access
Question # 17

Refer to the exhibit.

Assume that all devices in the FortiAnalyzer Fabric are shown in the image.

Which two statements about the FortiAnalyzer Fabric deployment are true? (Choose two.)

A.

FortiGate-B1 and FortiGate-B2 are in a Security Fabric.

B.

There is no collector in the topology.

C.

All FortiGate devices are directly registered to the supervisor.

D.

FAZ-SiteA has two ADOMs enabled.

Full Access