Fortinet FCP_FAZ_AD-7.4 Practice Test - Questions Answers, Page 3

List of questions
Question 21

Which statement about the communication between FortiGate high availability (HA) clusters and FortiAnalyzer is true?
If devices were registered to FortiAnalyzer before forming a cluster, you can manually add them together.
FortiAnalyzer distinguishes each cluster member by the IP addresses in log message headers.
If the HA primary device becomes unavailable, you must remove it from the HA cluster list on FortiAnalyzer.
The FortiGate HA cluster must be in active-passive mode in order to avoid conflict.
This allows FortiAnalyzer to correctly identify and process logs from different members of the HA cluster.
Question 22

Which two methods can you use to restrict administrative access on FortiAnalyzer? (Choose two.)
Configure trusted hosts.
Limit access to specific virtual domains.
Fabric connectors to external LDAP servers.
Use administrator profiles.
Configure trusted hosts.
Trusted hosts restrict administrative access to FortiAnalyzer by limiting the IP addresses or subnets from which administrators can log in.
Use administrator profiles.
Administrator profiles define roles and permissions, restricting what specific administrators can access and manage on FortiAnalyzer.
The other options are not applicable because:
Limiting access to specific virtual domains is not applicable to FortiAnalyzer, as virtual domains (VDOMs) are a concept used in FortiGate, not FortiAnalyzer.
Fabric connectors to external LDAP servers are used for authentication purposes but do not directly restrict administrative access based on roles or IP addresses.
Question 23

Which two statements regarding FortiAnalyzer log forwarding modes are true? (Choose two.)
Both modes, forwarding and aggregation, support encryption of logs between devices.
In aggregation mode, you can forward logs to syslog and CEF servers.
Forwarding mode forwards logs in real time only to other FortiAnalyzer devices.
Aggregation mode stores logs and content files and uploads them to another FortiAnalyzer device at a scheduled time.
Both modes, forwarding and aggregation, support encryption of logs between devices.
Both forwarding and aggregation modes can use encryption to securely transfer logs between FortiAnalyzer devices.
Aggregation mode stores logs and content files and uploads them to another FortiAnalyzer device at a scheduled time.
In aggregation mode, logs are stored and then transferred to another FortiAnalyzer at a scheduled time, rather than in real-time. This mode is typically used when consolidating logs from multiple devices into a central FortiAnalyzer.
The other options are incorrect because:
Forwarding mode sends logs in real-time but not exclusively to other FortiAnalyzer devices; it can also send logs to external systems like syslog servers.
Aggregation mode is primarily for consolidating logs to another FortiAnalyzer and doesn't focus on forwarding logs to syslog or CEF servers.
Question 24

Refer to the exhibit.
Based on the partial outputs displayed, which devices can be members of a FortiAnalyzer Fabric?
FortiAnalyzer1 and FortiAnalyzer3
All devices listed can be members.
FortiAnalyzer1 and FortiAnalyzer2
FortiAnalyzer2 and FortiAnalyzer3
Based on the partial configuration output, the primary factor for determining which devices can be members of a FortiAnalyzer Fabric is the log-mode setting. Devices with the same log mode can be part of the same FortiAnalyzer Fabric.
FortiAnalyzer1: Log mode is set to collector.
FortiAnalyzer2: Log mode is set to collector.
FortiAnalyzer3: Log mode is set to analyzer.
Devices with the same log mode can be part of the same fabric. Since FortiAnalyzer1 and FortiAnalyzer2 both have their log modes set to collector, they can be members of a FortiAnalyzer Fabric.
Therefore, the correct answer is FortiAnalyzer1 and FortiAnalyzer2.
Question 25

Which two statements about FortiAnalyzer operating modes are true? (Choose two.)
When in collector mode, FortiAnalyzer offloads the log receiving task to the analyzer.
When in analyzer mode, FortiAnalyzer supports event management and reporting features.
For the collector, you should allocate most of the disk space to analytics logs.
Analyzer mode is the default operating mode.
When in analyzer mode, FortiAnalyzer supports event management and reporting features.
In analyzer mode, FortiAnalyzer provides full support for log analysis, event management, and reporting capabilities.
Analyzer mode is the default operating mode.
By default, FortiAnalyzer operates in analyzer mode, which allows for log analysis and reporting.
The other options are incorrect because:
In collector mode, the FortiAnalyzer primarily stores logs and forwards them to another FortiAnalyzer in analyzer mode, not the other way around.
In collector mode, most disk space is usually allocated to storage rather than analytics, as the logs are primarily stored for forwarding.
Question 26

Refer to the exhibit.
Based on the output, what can you conclude about the FortiAnalyzer logging status?
The connection between FortiGate and FortiAnalyzer is overloaded.
FortiGate has logs to send, but FortiAnalyzer is unavailable.
FortiGate is configured to send logs in batches.
FortiGate is sending logs again after it performed a reboot.
The output shows that FortiGate has sent a large number of logs (sent=180189698), but some logs have failed to be sent (failed=4507). This suggests that FortiAnalyzer was temporarily unavailable or had an issue receiving logs, leading to the failure count. There are no logs cached or dropped, indicating FortiGate is still attempting to send logs but with some failures.
Question 27

An administrator has configured the following settings:
What is the purpose of executing these commands?
To record the hash value and authentication code of log files.
To encrypt log transfer between FortiAnalyzer and other devices.
To create the secure channel used by the OFTP process.
To verify the integrity of the log files received.
The command set log-checksum md5-auth configures FortiAnalyzer to generate an MD5 hash for each log file, along with an authentication code. This ensures that the integrity of the logs can be verified, confirming that the logs have not been tampered with.
Question 28

What is the best approach to handle a hard disk failure on a FortiAnalyzer that supports hardware RAID?
There is no need to do anything because the disk will self-recover.
Run execute format disk to format and restart the FortiAnalyzer device.
Perform a hot swap of the disk.
Shut down FortiAnalyzer and replace the disk.
In a hardware RAID setup, FortiAnalyzer supports hot swapping, which allows you to replace a failed disk without shutting down the device. The RAID controller will automatically rebuild the array using the new disk, minimizing downtime and maintaining data integrity.
Question 29

Which statement when you are upgrading the firmware on an HA cluster made up of three FortiAnalyzer devices is true?
You can perform the firmware upgrade using only a console connection.
All FortiAnalyzer devices will be upgraded at the same time.
Enabling uninterruptible-upgrade prevents normal operations from being interrupted during the upgrade.
First, upgrade the secondary devices, and then upgrade the primary device.
When upgrading firmware on an HA cluster of FortiAnalyzer devices, it is recommended to upgrade the secondary devices first, and then upgrade the primary device to minimize downtime and maintain continuity in log collection and other HA functions. This ensures that the primary device continues to handle operations while the secondary devices are being upgraded, and once the secondary devices are updated, the primary device can be upgraded with minimal service disruption.
Question 30

Refer to the exhibit.
The exhibit shows the creation of a new administrator on FortiAnalyzer. The new account uses the credentials stored on an LDAP server.
Why would an administrator configure a password for this account?
This password is used if the authentication server becomes unreachable.
This password authenticates FortiAnalyzer aqainst the LDAP server.
This password is set to comply with FortiAnalvzer password policy
This password is required because this is a restricted user.
When using LDAP for authentication, a password can be set locally on FortiAnalyzer as a fallback option in case the LDAP server becomes unreachable. This ensures that the administrator can still log in if there are issues with the LDAP server.
Question