Fortinet FCP_FAZ_AD-7.4 Practice Test - Questions Answers, Page 2
List of questions
Related questions
In a Fortinet Security Fabric, what can make an upstream FortiGate create traffic logs associated with sessions initiated on downstream FortiGate devices?
The traffic destination is another FortiGate in the fabric.
The upstream FortiGate is configured to do NAT
Log redundancy is configured in the fabric.
The downstream device cannot connect to FortiAnalyzer.
You finished registering a FortiGate device. After traffic starts to flow through FortiGate, you notice that only some of the logs expected are being received on FortiAnalyzer.
What could be the reason for the logs not arriving on FortiAnalyzer?
FortiGate was added to the wrong ADOM type.
This FortiGate model is not fully supported.
FortiGate does not have logging configured correctly.
This FortiGate is part of an HA cluster but it is the secondary device.
Refer to the exhibit.
The exhibit shows the creation of a new administrator on FortiAnalyzer.
What are two effects of enabling the choice Match all users on remote server when configuring a new administrator? (Choose two.)
It allows user accounts in the LDAP server to use two-factor authentication.
It creates a wildcard administrator using an LDAP server.
User Remote-Admin from the LDAP server will be able to log in to FortiAnalyzer at any time.
Administrators can log in to FortiAnalyzer using their credentials on the remote LDAP server.
You are trying to initiate an authorization request from FortiGate to FortiAnalyzer, but the Security Fabric window does not open when you click Authorize.
Which two reasons can cause this to happen? (Choose two.)
A pre-shared key needs to be established on both sides.
The management computer does not have connectivity to the authorization IP address and port combination.
The Security Fabric root is unauthorized and needs to be added as a trusted host.
The fabric authorization settings on FortiAnalyzer are misconfigured.
Which statement correctly describes RAID 10 (1+0) on FortiAnalyzer?
A configuration with four disks, each with 2 TB of capacity, provides a total space of 4 TB.
11 combines mirroring striping and distributed parity to provide performance and fault tolerance
A configuration with four disks, each with 2 TB of capacity, provides a total space of 2 TB.
It uses striping to provide performance and fault tolerance.
Which two statements about deleting ADOMs are true? (Choose two.)
Logs must be purged or migrated before you can delete an ADOM.
ADOMs with registered devices cannot be deleted.
Default ADOMs cannot be deleted.
The status of the ADOMs must be unlocked.
Refer to the exhibit.
The capture displayed was taken on a FortiAnalyzer.
Why is a single IP address shown as the source for all logs received?
FortiAnalyzer is using the device MAC addresses to differentiate their logs.
The logs belong to devices that are part of a high availability (HA) cluster.
FortiAnalyzer is receiving logs from the root FortiGate of a Security Fabric.
The device sending logs has two VDOMs in the same ADOM.
Refer to the exhibit.
What is the purpose of configuring FortiAnalyzer with the settings displayed in the image?
To increase reliability
To expand bandwidth
To maximize resiliency
To improve security
An administrator, fortinet, can view logs and perform device management tasks, such as adding and removing registered devices. However, administrator fortinet is not able to create a mail server that can be used to send alert emails.
What can be the problem?
ADOM mode is configured with Advanced mode.
A trusted host is configured.
fortinet is assigned the default Standard_User administrative profile.
fortinet is assigned the default Restricted_User administrative profile.
Which two elements are contained in a system backup created on FortiAnalyzer? (Choose two.)
Logs from registered devices
Database snapshot
Report information
System information
Question