ExamGecko
Home Home / Fortinet / FCP_FAZ_AN-7.4

Fortinet FCP_FAZ_AN-7.4 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Which two statements about playbook execution are true? (Choose two)

A.

FortiAnalyzer will not commit changes made by a Failed playbook

A.

FortiAnalyzer will not commit changes made by a Failed playbook

Answers
B.

The Playbook Monitor provides troubleshooting logs

B.

The Playbook Monitor provides troubleshooting logs

Answers
C.

You can <un the default debugging playbook to investigate playbook errors. O Even I the playbook status is Failed, individual tasks may have succeeded.

C.

You can <un the default debugging playbook to investigate playbook errors. O Even I the playbook status is Failed, individual tasks may have succeeded.

Answers
Suggested answer: A, B

You discover that a few reports are taking a long tine lo generate. Which two steps can you Like to troubleshoot? (Choose two.)

A.

Remove old reports from the hcache

A.

Remove old reports from the hcache

Answers
B.

Enable auto-cache and run the reports again

B.

Enable auto-cache and run the reports again

Answers
C.

Increase the ADOM reports quota

C.

Increase the ADOM reports quota

Answers
D.

Review report diagnostics

D.

Review report diagnostics

Answers
Suggested answer: A, B

Which two statements about exporting and importing playbacks are true? (Choose two.)

A.

A playbook that was disabled when it was exported mil be disabled when it is imported.

A.

A playbook that was disabled when it was exported mil be disabled when it is imported.

Answers
B.

Playbooks can so imported 10 a different FortiAnayzer device, but only if the connectors already exist

B.

Playbooks can so imported 10 a different FortiAnayzer device, but only if the connectors already exist

Answers
C.

You can import a playbook even if there is another one win the same name in the destination

C.

You can import a playbook even if there is another one win the same name in the destination

Answers
D.

You can export only one playbook at a time.

D.

You can export only one playbook at a time.

Answers
Suggested answer: C, D

You are tasked with finding logs corresponding to a suspected attack on your network.

You need to use an interface where all identified threats within timeframe are listed and organized. You also need to be able to quickly export the information to a PDF file.

Where can you go to accomplish this task?

A.

Log Browse

A.

Log Browse

Answers
B.

Log View

B.

Log View

Answers
C.

Fabric View

C.

Fabric View

Answers
D.

FortiView

D.

FortiView

Answers
Suggested answer: D

Which statement about automation connectors in FortiAnalyzer is true?

A.

An ADOM with the Fabric type comes with multiple connectors configured.

A.

An ADOM with the Fabric type comes with multiple connectors configured.

Answers
B.

The local connector becomes available after you configured any external connector.

B.

The local connector becomes available after you configured any external connector.

Answers
C.

The local connector becomes available after you connectors are displayed.

C.

The local connector becomes available after you connectors are displayed.

Answers
D.

The actions available with FortiOS connectors are determined by automation rules configured on FortiGate.

D.

The actions available with FortiOS connectors are determined by automation rules configured on FortiGate.

Answers
Suggested answer: D

What is the purpose of using data selectors when configuring event handlers?

A.

They filter the types of logs that FortiAnalyzer can accept from registered devices.

A.

They filter the types of logs that FortiAnalyzer can accept from registered devices.

Answers
B.

They download new filters can be used in event handlers.

B.

They download new filters can be used in event handlers.

Answers
C.

They apply their filter criteria to the entire event handler so that you don't have to configure the same criteria in the individual rules.

C.

They apply their filter criteria to the entire event handler so that you don't have to configure the same criteria in the individual rules.

Answers
D.

They are common filters that can be applied simultaneously to all event handlers.

D.

They are common filters that can be applied simultaneously to all event handlers.

Answers
Suggested answer: C

Which statement about exporting items in Report Definitions is true?

A.

Templates can be exported.

A.

Templates can be exported.

Answers
B.

Template exports contain associated charts and datasets.

B.

Template exports contain associated charts and datasets.

Answers
C.

Chart exports contain associated datasets.

C.

Chart exports contain associated datasets.

Answers
D.

Datasets can be exported.

D.

Datasets can be exported.

Answers
Suggested answer: B

Which log will generate an event with the status Contained?

A.

An AV log with action=quarantine.

A.

An AV log with action=quarantine.

Answers
B.

An IPS log with action=pass.

B.

An IPS log with action=pass.

Answers
C.

A WebFilter log will action=dropped.

C.

A WebFilter log will action=dropped.

Answers
D.

An AppControl log with action=blocked.

D.

An AppControl log with action=blocked.

Answers
Suggested answer: A

Exhibit.

What does the data point at 12:20 indicate?

A.

The log insert log time is increasing.

A.

The log insert log time is increasing.

Answers
B.

FortiAnalyzer is using its cache to avoid dropping logs.

B.

FortiAnalyzer is using its cache to avoid dropping logs.

Answers
C.

The performance of FortiAnalyzer is below the baseline.

C.

The performance of FortiAnalyzer is below the baseline.

Answers
D.

The sqiplugind service is caught up with the logs

D.

The sqiplugind service is caught up with the logs

Answers
Suggested answer: A

Which statement about the FortiSIEM management extension is correct?

A.

It allows you to manage the entire life cycle of a threat or breach.

A.

It allows you to manage the entire life cycle of a threat or breach.

Answers
B.

It can be installed as a dedicated VM.

B.

It can be installed as a dedicated VM.

Answers
C.

Its use of the available disk space is capped at 50%.

C.

Its use of the available disk space is capped at 50%.

Answers
D.

It requires a licensed FortiSIEM supervisor.

D.

It requires a licensed FortiSIEM supervisor.

Answers
Suggested answer: B
Total 56 questions
Go to page: of 6