Fortinet FCSS_ADA_AR-6.7 Practice Test - Questions Answers

List of questions
Question 1

A service provider purchases a licensed EPS of 520. The guaranteed EPS allocated to three customers is 50, 100, and 150 respectively. At the end of every three-minute interval, incoming EPS is calculated at every collector and the value is sent to the central decision-making engine on the supervisor node.
The incoming EPS for the first collector is 25. the incoming EPS for the second collector is 50, and the incoming EPS for the third collector is 75.
Based on the information provided, what is the unused events total calculated by the supervisor?
76.000
35.960
75.960
71.460
Guaranteed Allocation: 50 + 100 + 150 = 300 EPS
Actual (Incoming) Usage: 25 + 50 + 75 = 150 EPS
Unused from guarantees = 300 150 = 150 EPS
Burst Capacity (Licensed minus Guaranteed): 520 300 = 220 EPS
Total Unused Capacity: 150 + 220 = 370 EPS
As a Percentage of Licensed EPS: 370/520 71.15% reported (after conversion/rounding) as ~71.460
Question 2

Which statement accurately contrasts lookup tables with watchlists?
Lookup table values age out after a period, whereas watchlist values do not have any time condition.
You can populate lookup tables through an incident, whereas you cannot populate watchlists through an incident.
Lookup tables can contain multiple columns, whereas watchlists contain only a single column.
You can reference lookup table data in analytic queries and reports almost immediately, whereas you may have to wait up to 5-10minutes for watchlist entries to be useable in queries and reports.
Lookup tables and watchlists serve different purposes in Fortinet's Advanced Analytics:
Lookup tables allow for structured data storage with multiple columns, making them useful for correlating different attributes or key-value pairs.
Watchlists are simpler and contain only a single column, often used for quick reference to flagged values, such as IP addresses or user accounts.
Question 3

Refer to the exhibit.
How long has the UEBA agent been operationally down?
2 Hours
20 Hours
21 Hours
9 Hours
Based on the provided exhibit, we can determine how long the UEBA agent has been operationally down by looking at the 'First Occurred' and 'Last Occurred' timestamps.
First Occurred: Sep 13, 2021, at 01:10 PM
Last Occurred: Sep 14, 2021, at 09:10 AM
From Sep 13, 01:10 PM to Sep 14, 01:10 AM 12 hours
From Sep 14, 01:10 AM to Sep 14, 09:10 AM 8 hours
Total downtime = 12 + 8 = 20 hours
Question 4

How can you empower SOC by deploying FortiSOAR? (Choose three.)
Collaborative knowledge sharing
Aggregate logs from distributed systems
Address analyst skills gap
Baseline user and traffic behavior
Reduce human error
Collaborative knowledge sharing: FortiSOAR enables security teams to share knowledge, automate workflows, and improve incident response efficiency by centralizing intelligence and standardizing processes.
Addressing analyst skills gap: By automating repetitive tasks and providing guided response playbooks, FortiSOAR helps SOC teams compensate for skill shortages and improve operational effectiveness.
Reducing human error: Automation and predefined workflows minimize manual interventions, reducing the likelihood of errors in incident detection, response, and remediation.
Question 5

Refer to the exhibit.
This is an example of a baseline profile that is configured in the backend of FortiSIEM.
Which two Group By attributes are configured for this profile? (Choose two.)
Logon Failure
Reporting Device
Reporting IP
Distinct User
From the provided XML configuration, we need to focus on the <GroupByAttr> section, which defines the attributes used for grouping.
In the SelectClause, the following attributes are listed:
reptDevName, reptDevAddr, COUNT(*), COUNT(DISTINCT user), COUNT(DISTINCT srcIpAddr)
reptDevName represents the reporting device.
reptDevAddr represents the reporting IP.
COUNT(DISTINCT user) tracks unique users.
COUNT(DISTINCT srcIpAddr) tracks distinct source IPs.
In the GroupByAttr section:
<GroupByAttr>reptDevName, reptDevAddr</GroupByAttr>
This confirms that the grouping is performed by Reporting Device (reptDevName) and Reporting IP (reptDevAddr).
Question 6

Refer to the exhibit.
Which scenario is not a supported nested query scenario?
The outer query is the event query, and the inner query is the event query.
The outer query is the event query, and the inner query is the CMDB query.
The outer query is the CMDB query, and the inner query is the event query.
The outer query is the CMDB query, and the inner query is the CMDB query.
FortiSIEM does not allow CMDB queries to be nested within other CMDB queries. CMDB data is static information, and nesting would not add value or function properly in query execution.
Question 7

When you perform a Group By on a structured query, which two outcomes occur? (Choose two.)
Group By automatically applies a COUNT aggregation.
Group By is applied to real-time and historical searches.
Group By cannot be applied to an aggregated function.
Group By is applied to historical searches only.
Group By automatically applies a COUNT aggregation.
When using Group By in FortiSIEM structured queries, it automatically applies a COUNT(*) function unless a different aggregation (such as SUM, AVG, or MAX) is specified. This helps summarize data by counting occurrences of grouped attributes.
Group By is applied to real-time and historical searches.
Grouping functions work in both real-time (live event monitoring) and historical (past event analysis) searches, making it useful for trend analysis, anomaly detection, and correlation.
Question 8

Refer to the exhibit.
Within what time window is the incident auto cleared?
1800 seconds
Null
1 day
30 minutes
In the exhibit, the 'Clear If' condition does not specify a condition for auto-clearing the incident. If an incident does not have a specific clear condition, it remains active until manually resolved or cleared by another process.
Question 9

Refer to the exhibit.
Which statement about the rule filters events shown in the exhibit is true?
The rule filters events with an event type that equals Domain Account Locked and a reporting IP that equals Domain Controller applications.
The rule filters events with an event type that belong to the Domain Account Locked CMDB group or a reporting IP that belong to the Domain Controller applications group.
The rule filters events with an event type that belong to the Domain Account Locked CMDB group and a reporting IP that belong to the Domain Controller applications group.
The rule filters events with an event type that belong to the Domain Account Locked CMDB group and a user that belongs to the Domain Controller applications group.
From the Filters section in the exhibit, we see:
1. Event Type IN EventTypes: Domain Account Locked
2. Reporting IP IN Applications: Domain Controller
3. Logical Operator: AND
Since both conditions must be true, the rule is effectively filtering events where:
The event type belongs to the Domain Account Locked CMDB group
The reporting IP belongs to the Domain Controller applications group
Question 10

Refer to the exhibit.
Why was this incident auto cleared?
Within five minutes, the packet loss percentage dropped to a level where the host IP of the original rule matches the host IP of the clear condition pattern
Within five minutes the packet loss percentage dropped to a level where the reporting IP is the same as the host IP
The original rule did not trigger within five minutes
Within five minutes, the packet loss percentage dropped to a level where the reporting IP is same as the source IP
From the 'Clear If' condition in the exhibit:
WITHIN 5 minutes, the system checks if the pattern AllPingLossSrv_CLEAR occurs.
The Host IP of the clear condition must match the Host IP of the original rule (Clear_Condition.Host IP = Original_Rule.Host IP).
If this condition is met, the system automatically clears the incident because it indicates that network connectivity has been restored (packet loss has dropped).
Thus, the incident was auto-cleared because the system detected that the issue was resolved within the defined 5-minute window, meeting the conditions for auto-clearance.
Question