ExamGecko
Home Home / Fortinet / NSE5_FSM-6.3

Fortinet NSE5_FSM-6.3 Practice Test - Questions Answers

Question list
Search
Search

An administrator is configuring FortiSIEM to discover network devices and receive syslog from network devices. Which statement is correct?

A.
FortiSIEM uses privileged credentials to tog in to devices and make network configuration changes.
A.
FortiSIEM uses privileged credentials to tog in to devices and make network configuration changes.
Answers
B.
FortiSIEM automatically configures network devices to send syslog using the auto log discovery process.
B.
FortiSIEM automatically configures network devices to send syslog using the auto log discovery process.
Answers
C.
FortiSIEM automatically configures network devices to send syslog using the GUI discovery process
C.
FortiSIEM automatically configures network devices to send syslog using the GUI discovery process
Answers
D.
Syslog configuration must be done manually on devices by the network administrator.
D.
Syslog configuration must be done manually on devices by the network administrator.
Answers
Suggested answer: D

Explanation:

Syslog Configuration in FortiSIEM: For FortiSIEM to receive syslog messages from network devices, those devices need to be properly configured to send syslog data to FortiSIEM.

Manual Configuration Requirement: FortiSIEM does not automatically configure network devices to send syslog messages. Instead, this configuration must be performed manually by the network administrator.

Process Overview: The network administrator must access each device and set up the syslog parameters to direct log data to the FortiSIEM collector's IP address.

Discovery Process: While FortiSIEM can discover network devices using SNMP, WMI, and other protocols, the configuration of syslog on these devices is beyond its scope and requires manual intervention.

Reference: FortiSIEM 6.3 User Guide, Device Configuration and Syslog Integration sections, which explain the requirements and steps for setting up syslog forwarding on network devices.

Refer to the exhibit.

It events are grouped by Event Type and User attributes in FortiSIEM. how many results will be displayed?

A.
Four results will be displayed.
A.
Four results will be displayed.
Answers
B.
Eight results will be displayed.
B.
Eight results will be displayed.
Answers
C.
Two results will be displayed.
C.
Two results will be displayed.
Answers
D.
No results will be displayed.
D.
No results will be displayed.
Answers
Suggested answer: B

Explanation:

Grouping Events in FortiSIEM: Grouping events by specific attributes allows administrators to aggregate and analyze data more efficiently.

Grouping Criteria: In this case, the events are grouped by 'Event Type' and 'User' attributes.

Unique Combinations: To determine the number of results displayed, identify the unique combinations of the 'Event Type' and 'User' attributes in the provided data.

Failed Logon by Ryan (appears multiple times but is one unique combination)

Failed Logon by John

Failed Logon by Paul

Failed Logon by Wendy

Unique Groupings: There are four unique groupings based on the given data: 'Failed Logon' by 'Ryan', 'John', 'Paul', and 'Wendy'.

Reference: FortiSIEM 6.3 User Guide, Event Management and Reporting sections, which explain how events are grouped and reported based on selected attributes.

Refer to the exhibit.

An administrator is trying to identify an issue using an expression bated on the Expression Builder settings shown in the exhibit however, the error message shown in the exhibit indicates that the expression is invalid.

Which is the correct expression?

A.
Matched Events COUNT()
A.
Matched Events COUNT()
Answers
B.
Matched Events(COUNT)
B.
Matched Events(COUNT)
Answers
C.
COUNT(Matched Events)
C.
COUNT(Matched Events)
Answers
D.
(COUNT) Matched Events
D.
(COUNT) Matched Events
Answers
Suggested answer: C

Explanation:

Expression Builder in FortiSIEM: The Expression Builder is used to create expressions for analyzing event data.

Correct Syntax: The correct syntax for counting matched events is COUNT(Matched Events).

Function: COUNT is a function that takes a parameter, in this case, 'Matched Events,' to count the number of occurrences.

Common Errors: Incorrect syntax, such as reversing the order or using parentheses improperly, can lead to invalid expressions.

Reference: FortiSIEM 6.3 User Guide, Expression Builder section, which explains the correct syntax and usage for creating valid expressions for event analysis.

Which three ports can be used to send Syslogs to FortiSIEM? (Choose three.)

A.
UDP9999
A.
UDP9999
Answers
B.
UDP 162
B.
UDP 162
Answers
C.
TCP 514
C.
TCP 514
Answers
D.
UDP 514
D.
UDP 514
Answers
E.
TCP 1470
E.
TCP 1470
Answers
Suggested answer: C, D, E

Explanation:

Syslog Ports: Syslog messages can be sent over different ports using TCP or UDP protocols.

Common Ports for Syslog:

UDP 514: This is the default port for sending syslog messages over UDP.

TCP 514: This is the default port for sending syslog messages over TCP, providing a more reliable transmission.

TCP 1470: This port is often used for secure or alternative syslog transmission.

Usage in FortiSIEM: FortiSIEM can be configured to receive syslog messages on these ports to ensure the logs are collected from various network devices.

Reference: FortiSIEM 6.3 User Guide, Syslog Integration section, which details the supported ports for syslog transmission.

In the advanced analytical rules engine in FortiSIEM, multiple subpatterms can be referenced using which three operation?(Choose three.)

A.
ELSE
A.
ELSE
Answers
B.
NOT
B.
NOT
Answers
C.
FOLLOWED_BY
C.
FOLLOWED_BY
Answers
D.
OR
D.
OR
Answers
E.
AND
E.
AND
Answers
Suggested answer: C, D, E

Explanation:

Advanced Analytical Rules Engine: FortiSIEM's rules engine allows for complex event correlation using multiple subpatterns.

Operations for Referencing Subpatterns:

FOLLOWED_BY: This operation is used to indicate that one event follows another within a specified time window.

OR: This logical operation allows for the inclusion of multiple subpatterns, where the rule triggers if any of the subpatterns match.

AND: This logical operation requires all referenced subpatterns to match for the rule to trigger.

Usage: These operations allow for detailed and precise event correlation, helping to detect complex patterns and incidents.

Reference: FortiSIEM 6.3 User Guide, Advanced Analytics Rules Engine section, which explains the use of different operations to reference subpatterns in rules.

Device discovery information is stored in which database?

A.
CMDB
A.
CMDB
Answers
B.
Profile DB
B.
Profile DB
Answers
C.
Event DB
C.
Event DB
Answers
D.
SVN DB
D.
SVN DB
Answers
Suggested answer: A

Explanation:

Device Discovery Information: Information about discovered devices, including their configurations and statuses, is stored in a specific database.

CMDB: The Configuration Management Database (CMDB) is used to store detailed information about the devices discovered by FortiSIEM.

Function: It maintains comprehensive details about device configurations, relationships, and other metadata essential for managing the IT infrastructure.

Significance: Storing discovery information in the CMDB ensures that the FortiSIEM system has a centralized repository of device information, facilitating efficient management and monitoring.

Reference: FortiSIEM 6.3 User Guide, Configuration Management Database (CMDB) section, which details the storage and usage of device discovery information.

Which FortiSIEM components can do performance availability and performance monitoring?

A.
Supervisor, worker, and collector
A.
Supervisor, worker, and collector
Answers
B.
Supervisor and workers only
B.
Supervisor and workers only
Answers
C.
Supervisor only
C.
Supervisor only
Answers
D.
Collectors only
D.
Collectors only
Answers
Suggested answer: A

Explanation:

Performance and Availability Monitoring: Various components in FortiSIEM are responsible for monitoring the performance and availability of devices and services.

Components:

Supervisor: Oversees the entire FortiSIEM infrastructure and coordinates the activities of other components.

Worker: Processes and analyzes the collected data, including performance and availability metrics.

Collector: Gathers performance and availability data from devices in the network.

Collaborative Functioning: These components work together to ensure comprehensive monitoring of the network's performance and availability.

Reference: FortiSIEM 6.3 User Guide, Performance and Availability Monitoring section, which explains the roles of the supervisor, worker, and collector in monitoring tasks.

Which command displays the Linux agent status?

A.
Service fsm-linux-agent status
A.
Service fsm-linux-agent status
Answers
B.
Service Ao-linux-agent status
B.
Service Ao-linux-agent status
Answers
C.
Service fortisiem-linux-agent status
C.
Service fortisiem-linux-agent status
Answers
D.
Service linux-agent status
D.
Service linux-agent status
Answers
Suggested answer: C

Explanation:

Linux Agent in FortiSIEM: The FortiSIEM Linux agent is responsible for collecting logs and metrics from Linux devices and forwarding them to the FortiSIEM system.

Command for Checking Status: The correct command to check the status of the FortiSIEM Linux agent is service fortisiem-linux-agent status.

Usage: Properly checking the agent status helps ensure that data collection from Linux devices is functioning as expected.

Reference: FortiSIEM 6.3 User Guide, Linux Agent Installation and Management section, which includes commands for managing the Linux agent.

Refer to the exhibit.

If events are grouped by User. Source IP. and Application Category attributes in FortiSiEM. how many results will be displayed?

A.
Three results will be displayed.
A.
Three results will be displayed.
Answers
B.
Five results will be displayed.
B.
Five results will be displayed.
Answers
C.
No results will be displayed.
C.
No results will be displayed.
Answers
D.
Seven results will be displayed.
D.
Seven results will be displayed.
Answers
Suggested answer: B

Explanation:

Grouping Events in FortiSIEM: Grouping events by specific attributes allows for the aggregation of similar events, providing clearer insights and reducing clutter.

Grouping Criteria: For this question, events are grouped by 'User,' 'Source IP,' and 'Application Category.'

Unique Combinations Analysis:

Ryan, 1.1.1.1, Web App (appears multiple times but is one unique combination)

John, 5.5.5.5, DB

Paul, 3.3.2.1, Web App

Ryan, 1.1.1.15, DB

Wendy, 1.1.1.6, DB

Result Calculation: There are five unique combinations in the provided data based on the specified grouping attributes.

Reference: FortiSIEM 6.3 User Guide, Event Management and Reporting sections, which explain how to group events by various attributes for analysis and reporting purposes.

If a performance rule is triggered repeatedly due to high CPU use, what occurs in the incident table?

A.
A now incident is created each time the rule is triggered. and the First Seen and Last Seen times are updated.
A.
A now incident is created each time the rule is triggered. and the First Seen and Last Seen times are updated.
Answers
B.
A new incident is created based on the Rule Frequency value, and the First Seen and Last Seen times ate updated.
B.
A new incident is created based on the Rule Frequency value, and the First Seen and Last Seen times ate updated.
Answers
C.
The Incident Count value increases, and the First Seen and Last Seen times update.
C.
The Incident Count value increases, and the First Seen and Last Seen times update.
Answers
D.
The incident status changes to Repeated, and the First Seen and Last Seen times are updated.
D.
The incident status changes to Repeated, and the First Seen and Last Seen times are updated.
Answers
Suggested answer: C

Explanation:

Incident Management in FortiSIEM: FortiSIEM tracks incidents and their occurrences to help administrators manage and respond to recurring issues.

Performance Rule Triggering: When a performance rule, such as one for high CPU usage, is repeatedly triggered, FortiSIEM updates the corresponding incident rather than creating a new one each time.

Incident Table Updates:

Incident Count: The Incident Count value increases each time the rule is triggered, indicating how many times the incident has occurred.

First Seen and Last Seen Times: These timestamps are updated to reflect the first occurrence and the most recent occurrence of the incident.

Reference: FortiSIEM 6.3 User Guide, Incident Management section, explains how FortiSIEM handles recurring incidents and updates the incident table accordingly.

Total 50 questions
Go to page: of 5