ExamGecko
Home / Fortinet / NSE5_FSM-6.3 / List of questions
Ask Question

Fortinet NSE5_FSM-6.3 Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report Export Collapse

Which process converts raw log data to structured data?

Data classification
Data classification
Data validation
Data validation
Data parsing
Data parsing
Data enrichment
Data enrichment
Suggested answer: C
Explanation:

Raw Log Data: When devices send logs to FortiSIEM, the data arrives in a raw, unstructured format.

Data Parsing Process: The process that converts this raw log data into a structured format is known as data parsing.

Data Parsing: This involves extracting relevant fields from the raw log entries and organizing them into a structured format, making the data usable for analysis, reporting, and correlation.

Significance of Structured Data: Structured data is essential for effective event correlation, alerting, and generating meaningful reports.

Reference: FortiSIEM 6.3 User Guide, Data Parsing section, which details how raw log data is transformed into structured data through parsing.

asked 18/09/2024
Leandro Ruwer
50 questions

Question 12

Report Export Collapse

Refer to the exhibits.

Fortinet NSE5_FSM-6.3 image Question 12 26583 09182024190446000000

Fortinet NSE5_FSM-6.3 image Question 12 26583 09182024190446000000

Three events are collected over a 10-minute time period from two servers: Server A and Server B.

Based on the settings tor the rule subpattern. how many incidents will the servers generate?

Server A will generate one incident and Server B will generate one incident.
Server A will generate one incident and Server B will generate one incident.
Server A will generate one incident and Server B will not generate any incidents.
Server A will generate one incident and Server B will not generate any incidents.
Server B will generate one incident and Server A will not generate any incidents.
Server B will generate one incident and Server A will not generate any incidents.
Server A will not generate any incidents and Server B will not generate any incidents.
Server A will not generate any incidents and Server B will not generate any incidents.
Suggested answer: D
Explanation:

Event Collection Overview: The exhibits show three events collected over a 10-minute period from two servers, Server A and Server B.

Rule Subpattern Settings: The rule subpattern specifies two conditions:

AVG(CPU Util) > DeviceToCMDBAttr(Host IP : Server CPU Util Critical Threshold): This checks if the average CPU utilization exceeds the critical threshold defined for each server.

COUNT(Matched Events) >= 2: This requires at least two matching events within the specified period.

Server A Analysis:

Events: Three events (CPU=90, CPU=90, CPU=95).

Average CPU Utilization: (90+90+95)/3 = 91.67, which exceeds the critical threshold of 90.

Matched Events Count: 3, which meets the condition of being greater than or equal to 2.

Incident Generation: Server A meets both conditions, so it generates one incident.

Server B Analysis:

Events: Three events (CPU=70, CPU=50, CPU=60).

Average CPU Utilization: (70+50+60)/3 = 60, which does not exceed the critical threshold of 90.

Matched Events Count: 3, but since the average CPU utilization condition is not met, no incident is generated.

Conclusion: Based on the rule subpattern, Server A will generate one incident, and Server B will not generate any incidents.

Reference: FortiSIEM 6.3 User Guide, Event Correlation Rules and Incident Management sections, which explain how incidents are generated based on rule subpatterns and event conditions.

asked 18/09/2024
Avinash Jindal
40 questions

Question 13

Report Export Collapse

When configuring collectors located in geographically separated sites, what ports must be open on a front end firewall?

HTTPS, from the collector to the worker upload settings address only
HTTPS, from the collector to the worker upload settings address only
HTTPS, from the collector to the supervisor and worker upload settings addresses
HTTPS, from the collector to the supervisor and worker upload settings addresses
HTTPS, from the Internet to the collector
HTTPS, from the Internet to the collector
HTTPS, from the Internet to the collector and from the collector to the FortiSIEM cluster
HTTPS, from the Internet to the collector and from the collector to the FortiSIEM cluster
Suggested answer: B
Explanation:

FortiSIEM Architecture: In FortiSIEM, collectors gather data from various sources and send this data to supervisors and workers within the FortiSIEM architecture.

Communication Requirements: For collectors to effectively send data to the FortiSIEM system, specific communication channels must be open.

Port Usage: The primary port used for secure communication between the collectors and the FortiSIEM infrastructure is HTTPS (port 443).

Network Configuration: When configuring collectors in geographically separated sites, the HTTPS port must be open for the collectors to communicate with both the supervisor and the worker upload settings addresses. This ensures that the collected data can be securely transmitted to the appropriate processing and analysis components.

Reference: FortiSIEM 6.3 Administration Guide, Network Ports section details the necessary ports for communication within the FortiSIEM architecture.

asked 18/09/2024
Ioana Mihaila
25 questions

Question 14

Report Export Collapse

An administrator is in the process of renewing a FortiSIEM license. Which two commands will provide the system ID? (Choose two.)

phgetHWID
phgetHWID
./phLicenseTool - support
./phLicenseTool - support
phgetUUID
phgetUUID
./phLicenseTool-show
./phLicenseTool-show
Suggested answer: A, C
Explanation:

License Renewal Process: When renewing a FortiSIEM license, it is essential to provide the system ID, which uniquely identifies the FortiSIEM instance.

Commands to Retrieve System ID:

phgetHWID: This command retrieves the hardware ID of the FortiSIEM appliance.

Usage: Run the command phgetHWID in the CLI to obtain the hardware ID.

phgetUUID: This command retrieves the universally unique identifier (UUID) for the FortiSIEM system.

Usage: Run the command phgetUUID in the CLI to obtain the UUID.

Verification: Both phgetHWID and phgetUUID are valid commands for retrieving the necessary system IDs required for license renewal.

Reference: FortiSIEM 6.3 Administration Guide, Licensing section details the commands and procedures for obtaining system identification information necessary for license renewal.

asked 18/09/2024
Velli Mutham
38 questions

Question 15

Report Export Collapse

Refer to the exhibit.

Fortinet NSE5_FSM-6.3 image Question 15 26586 09182024190446000000

Which section contains the sortings that determine how many incidents are created?

Actions
Actions
Group By
Group By
Aggregate
Aggregate
Filters
Filters
Suggested answer: C
Explanation:

Incident Creation in FortiSIEM: Incidents in FortiSIEM are created based on specific patterns and conditions defined within the system.

Group By Function: The 'Group By' section in the 'Edit SubPattern' window specifies how the data should be grouped for analysis and incident creation.

Impact of Grouping: The way data is grouped affects the number of incidents generated. Each unique combination of the grouped attributes results in a separate incident.

Exhibit Analysis: In the provided exhibit, the 'Group By' section lists 'Reporting Device,' 'Reporting IP,' and 'User.' This means incidents will be created for each unique combination of these attributes.

Reference: FortiSIEM 6.3 User Guide, Rule and Pattern Creation section, which details how grouping impacts incident generation.

asked 18/09/2024
Talal Elemam
55 questions

Question 16

Report Export Collapse

Refer to the exhibit.

Fortinet NSE5_FSM-6.3 image Question 16 26587 09182024190446000000

What does the pauso icon indicate?

Data collection is paused after the intervals shown for metrics.
Data collection is paused after the intervals shown for metrics.
Data collection has not started.
Data collection has not started.
Data collection execution failed because the device is not reachable.
Data collection execution failed because the device is not reachable.
Data collection is paused duo to an issue, such as a change of password.
Data collection is paused duo to an issue, such as a change of password.
Suggested answer: D
Explanation:

Data Collection Status: FortiSIEM displays various icons to indicate the status of data collection for different devices.

Pause Icon: The pause icon specifically indicates that data collection is paused, but this can happen due to several reasons.

Common Cause for Pausing: One common cause for pausing data collection is an issue such as a change of password, which prevents the system from authenticating and collecting data.

Exhibit Analysis: In the provided exhibit, the presence of the pause icon next to the device suggests that data collection has encountered an issue that has caused it to pause.

Reference: FortiSIEM 6.3 User Guide, Device Management and Data Collection Status Icons section, which explains the different icons and their meanings.

asked 18/09/2024
Damien Fenderson
39 questions

Question 17

Report Export Collapse

Refer to the exhibit.

Fortinet NSE5_FSM-6.3 image Question 17 26588 09182024190446000000

A FortiSIEM administrator wants to group some attributes for a report, but is not able to do so successfully.

As shown in the exhibit, why are some of the fields highlighted in red?

Unique attributes cannot be grouped.
Unique attributes cannot be grouped.
The Event Receive Time attribute is not available for logs.
The Event Receive Time attribute is not available for logs.
The attribute COUNT(Matched events) is an invalid expression.
The attribute COUNT(Matched events) is an invalid expression.
No RAW Event Log attribute is available for devices.
No RAW Event Log attribute is available for devices.
Suggested answer: A
Explanation:

Grouping Attributes in Reports: When creating reports in FortiSIEM, certain attributes can be grouped to summarize and organize the data.

Unique Attributes: Attributes that are unique for each event cannot be grouped because they do not provide a meaningful aggregation or summary.

Red Highlighting Explanation: The red highlighting in the exhibit indicates attributes that cannot be grouped together due to their unique nature. These unique attributes include Event Receive Time, Reporting IP, Event Type, Raw Event Log, and COUNT(Matched Events).

Attribute Characteristics:

Event Receive Time is unique for each event.

Reporting IP and Event Type can vary greatly, making grouping them impractical in this context.

Raw Event Log represents the unprocessed log data, which is also unique.

COUNT(Matched Events) is a calculated field, not suitable for grouping.

Reference: FortiSIEM 6.3 User Guide, Reporting section, explains the constraints on grouping attributes in reports.

asked 18/09/2024
Faria Sah
40 questions

Question 18

Report Export Collapse

Refer to the exhibit.

Fortinet NSE5_FSM-6.3 image Question 18 26589 09182024190446000000

Which value will FortiSIEM use to populate the Event Type field?

PHL_INFO
PHL_INFO
phPerfJob
phPerfJob
PH_DSV_MON_SYS_DISK_UTIL
PH_DSV_MON_SYS_DISK_UTIL
diskUtil
diskUtil
Suggested answer: A
Explanation:

Event Type Population: In FortiSIEM, the Event Type field is populated based on specific identifiers within the raw message or event log.

Raw Message Analysis: The exhibit shows a raw message with various components, including PH_DEV_MON_SYS_DISK_UTIL, PHL_INFO, phPerfJob, and diskUtil.

Primary Event Identifier: The PH_DEV_MON_SYS_DISK_UTIL at the beginning of the raw message is the primary identifier for the event type. It categorizes the type of event, in this case, a system disk utilization monitoring event.

Event Type Field: FortiSIEM uses this primary identifier to populate the Event Type field, providing a clear categorization of the event.

Reference: FortiSIEM 6.3 User Guide, Event Processing and Event Types section, details how event types are identified and populated in the system.

asked 18/09/2024
Rico Banagale
44 questions

Question 19

Report Export Collapse

An administrator defines SMTP as a critical process on a Linux server.

It the SMTP process is stopped. FortiSIEM will generate a critical event with which event type?

Postfix-Mail-Stop
Postfix-Mail-Stop
PH_DEV_MON_PROC_STOP
PH_DEV_MON_PROC_STOP
PH_DEV_MON_SMTP_STOP
PH_DEV_MON_SMTP_STOP
Generic_SMTP_Procoss_Exit
Generic_SMTP_Procoss_Exit
Suggested answer: B
Explanation:

Process Monitoring in FortiSIEM: FortiSIEM can monitor critical processes on managed devices, such as an SMTP process on a Linux server.

Event Generation: When a critical process stops, FortiSIEM generates an event to alert administrators.

Event Types: Specific event types correspond to different monitored conditions. For a stopped process, the event type PH_DEV_MON_PROC_STOP is used.

Reasoning: The name PH_DEV_MON_PROC_STOP (Device Monitoring Process Stop) is a generic event type used by FortiSIEM to indicate that any monitored process, including SMTP, has stopped.

Reference: FortiSIEM 6.3 User Guide, Event Types section, explains the predefined event types and their usage in different monitoring scenarios.

asked 18/09/2024
Bob Hanselman
45 questions

Question 20

Report Export Collapse

Refer to the exhibit.

Fortinet NSE5_FSM-6.3 image Question 20 26591 09182024190447000000

An administrator is investigating a FortiSIEM license issue.

The procedure is for which offline licensing condition?

The procedure is for offline license debug.
The procedure is for offline license debug.
The procedure is for offline license registration.
The procedure is for offline license registration.
The procedure is for offline license validation.
The procedure is for offline license validation.
The procedure is for offline license verification.
The procedure is for offline license verification.
Suggested answer: B
Explanation:

Offline Licensing in FortiSIEM: FortiSIEM provides mechanisms for offline licensing to accommodate environments without direct internet access.

License Tool Command: The command ./phLicenseTool --collect license_req.dat is used to collect license information necessary for offline registration.

Procedure Analysis: The exhibit shows the output of this command, which indicates the collection of license information to a file named license_req.dat.

Offline License Registration: This collected data file is then typically uploaded to the FortiSIEM support portal or provided to the FortiSIEM support team for processing and generating a license file.

Reference: FortiSIEM 6.3 Administration Guide, Licensing section, details the procedures for both online and offline license registration, including the use of the phLicenseTool for offline scenarios.

asked 18/09/2024
Alan How
41 questions
Total 50 questions
Go to page: of 5