ExamGecko
Home / Fortinet / FCSS_SOC_AN-7.4 / List of questions
Ask Question

Fortinet FCSS_SOC_AN-7.4 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Which two statements about the FortiAnalyzer Fabric topology are true? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 12

Report Export Collapse

Review the following incident report:

Attackers leveraged a phishing email campaign targeting your employees.

The email likely impersonated a trusted source, such as the IT department, and requested login credentials.

An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).

The RAT provided the attackers with remote access and a foothold in the compromised system.

Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 13

Report Export Collapse

Refer to Exhibit:

Fortinet FCSS_SOC_AN-7.4 image Question 13 132063 12132024000420000000

A SOC analyst is designing a playbook to filter for a high severity event and attach the event information to an incident.

Which local connector action must the analyst use in this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 14

Report Export Collapse

According to the National Institute of Standards and Technology (NIST) cybersecurity framework, incident handling activities can be divided into phases.

In which incident handling phase do you quarantine a compromised host in order to prevent an adversary from using it as a stepping stone to the next phase of an attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 15

Report Export Collapse

Which FortiAnalyzer connector can you use to run automation stitches9

Become a Premium Member for full access
  Unlock Premium Member

Question 16

Report Export Collapse

Refer to the exhibits.

Fortinet FCSS_SOC_AN-7.4 image Question 16 132066 12132024000420000000

What can you conclude from analyzing the data using the threat hunting module?

Become a Premium Member for full access
  Unlock Premium Member

Question 17

Report Export Collapse

Refer to Exhibit:

Fortinet FCSS_SOC_AN-7.4 image Question 17 132067 12132024000420000000

You are tasked with reviewing a new FortiAnalyzer deployment in a network with multiple registered logging devices. There is only one FortiAnalyzer in the topology.

Which potential problem do you observe?

Become a Premium Member for full access
  Unlock Premium Member

Question 18

Report Export Collapse

Refer to the exhibit,

Fortinet FCSS_SOC_AN-7.4 image Question 18 132068 12132024000420000000

which shows the partial output of the MITRE ATT&CK Enterprise matrix on FortiAnalyzer.

Which two statements are true? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

Refer to the exhibits.

Fortinet FCSS_SOC_AN-7.4 image Question 19 132069 12132024000420000000

The Malicious File Detect playbook is configured to create an incident when an event handler generates a malicious file detection event.

Why did the Malicious File Detect playbook execution fail?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

Refer to the exhibit.

Fortinet FCSS_SOC_AN-7.4 image Question 20 132070 12132024000420000000

Assume that all devices in the FortiAnalyzer Fabric are shown in the image.

Which two statements about the FortiAnalyzer Fabric deployment are true? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member
Total 32 questions
Go to page: of 4
Search

Related questions