ExamGecko
Home Home / Fortinet / NSE5_FSM-6.3

Fortinet NSE5_FSM-6.3 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Which process converts raw log data to structured data?

A.
Data classification
A.
Data classification
Answers
B.
Data validation
B.
Data validation
Answers
C.
Data parsing
C.
Data parsing
Answers
D.
Data enrichment
D.
Data enrichment
Answers
Suggested answer: C

Explanation:

Raw Log Data: When devices send logs to FortiSIEM, the data arrives in a raw, unstructured format.

Data Parsing Process: The process that converts this raw log data into a structured format is known as data parsing.

Data Parsing: This involves extracting relevant fields from the raw log entries and organizing them into a structured format, making the data usable for analysis, reporting, and correlation.

Significance of Structured Data: Structured data is essential for effective event correlation, alerting, and generating meaningful reports.

Reference: FortiSIEM 6.3 User Guide, Data Parsing section, which details how raw log data is transformed into structured data through parsing.

Refer to the exhibits.

Three events are collected over a 10-minute time period from two servers: Server A and Server B.

Based on the settings tor the rule subpattern. how many incidents will the servers generate?

A.
Server A will generate one incident and Server B will generate one incident.
A.
Server A will generate one incident and Server B will generate one incident.
Answers
B.
Server A will generate one incident and Server B will not generate any incidents.
B.
Server A will generate one incident and Server B will not generate any incidents.
Answers
C.
Server B will generate one incident and Server A will not generate any incidents.
C.
Server B will generate one incident and Server A will not generate any incidents.
Answers
D.
Server A will not generate any incidents and Server B will not generate any incidents.
D.
Server A will not generate any incidents and Server B will not generate any incidents.
Answers
Suggested answer: D

Explanation:

Event Collection Overview: The exhibits show three events collected over a 10-minute period from two servers, Server A and Server B.

Rule Subpattern Settings: The rule subpattern specifies two conditions:

AVG(CPU Util) > DeviceToCMDBAttr(Host IP : Server CPU Util Critical Threshold): This checks if the average CPU utilization exceeds the critical threshold defined for each server.

COUNT(Matched Events) >= 2: This requires at least two matching events within the specified period.

Server A Analysis:

Events: Three events (CPU=90, CPU=90, CPU=95).

Average CPU Utilization: (90+90+95)/3 = 91.67, which exceeds the critical threshold of 90.

Matched Events Count: 3, which meets the condition of being greater than or equal to 2.

Incident Generation: Server A meets both conditions, so it generates one incident.

Server B Analysis:

Events: Three events (CPU=70, CPU=50, CPU=60).

Average CPU Utilization: (70+50+60)/3 = 60, which does not exceed the critical threshold of 90.

Matched Events Count: 3, but since the average CPU utilization condition is not met, no incident is generated.

Conclusion: Based on the rule subpattern, Server A will generate one incident, and Server B will not generate any incidents.

Reference: FortiSIEM 6.3 User Guide, Event Correlation Rules and Incident Management sections, which explain how incidents are generated based on rule subpatterns and event conditions.

When configuring collectors located in geographically separated sites, what ports must be open on a front end firewall?

A.
HTTPS, from the collector to the worker upload settings address only
A.
HTTPS, from the collector to the worker upload settings address only
Answers
B.
HTTPS, from the collector to the supervisor and worker upload settings addresses
B.
HTTPS, from the collector to the supervisor and worker upload settings addresses
Answers
C.
HTTPS, from the Internet to the collector
C.
HTTPS, from the Internet to the collector
Answers
D.
HTTPS, from the Internet to the collector and from the collector to the FortiSIEM cluster
D.
HTTPS, from the Internet to the collector and from the collector to the FortiSIEM cluster
Answers
Suggested answer: B

Explanation:

FortiSIEM Architecture: In FortiSIEM, collectors gather data from various sources and send this data to supervisors and workers within the FortiSIEM architecture.

Communication Requirements: For collectors to effectively send data to the FortiSIEM system, specific communication channels must be open.

Port Usage: The primary port used for secure communication between the collectors and the FortiSIEM infrastructure is HTTPS (port 443).

Network Configuration: When configuring collectors in geographically separated sites, the HTTPS port must be open for the collectors to communicate with both the supervisor and the worker upload settings addresses. This ensures that the collected data can be securely transmitted to the appropriate processing and analysis components.

Reference: FortiSIEM 6.3 Administration Guide, Network Ports section details the necessary ports for communication within the FortiSIEM architecture.

An administrator is in the process of renewing a FortiSIEM license. Which two commands will provide the system ID? (Choose two.)

A.
phgetHWID
A.
phgetHWID
Answers
B.
./phLicenseTool - support
B.
./phLicenseTool - support
Answers
C.
phgetUUID
C.
phgetUUID
Answers
D.
./phLicenseTool-show
D.
./phLicenseTool-show
Answers
Suggested answer: A, C

Explanation:

License Renewal Process: When renewing a FortiSIEM license, it is essential to provide the system ID, which uniquely identifies the FortiSIEM instance.

Commands to Retrieve System ID:

phgetHWID: This command retrieves the hardware ID of the FortiSIEM appliance.

Usage: Run the command phgetHWID in the CLI to obtain the hardware ID.

phgetUUID: This command retrieves the universally unique identifier (UUID) for the FortiSIEM system.

Usage: Run the command phgetUUID in the CLI to obtain the UUID.

Verification: Both phgetHWID and phgetUUID are valid commands for retrieving the necessary system IDs required for license renewal.

Reference: FortiSIEM 6.3 Administration Guide, Licensing section details the commands and procedures for obtaining system identification information necessary for license renewal.

Refer to the exhibit.

Which section contains the sortings that determine how many incidents are created?

A.
Actions
A.
Actions
Answers
B.
Group By
B.
Group By
Answers
C.
Aggregate
C.
Aggregate
Answers
D.
Filters
D.
Filters
Answers
Suggested answer: C

Explanation:

Incident Creation in FortiSIEM: Incidents in FortiSIEM are created based on specific patterns and conditions defined within the system.

Group By Function: The 'Group By' section in the 'Edit SubPattern' window specifies how the data should be grouped for analysis and incident creation.

Impact of Grouping: The way data is grouped affects the number of incidents generated. Each unique combination of the grouped attributes results in a separate incident.

Exhibit Analysis: In the provided exhibit, the 'Group By' section lists 'Reporting Device,' 'Reporting IP,' and 'User.' This means incidents will be created for each unique combination of these attributes.

Reference: FortiSIEM 6.3 User Guide, Rule and Pattern Creation section, which details how grouping impacts incident generation.

Refer to the exhibit.

What does the pauso icon indicate?

A.
Data collection is paused after the intervals shown for metrics.
A.
Data collection is paused after the intervals shown for metrics.
Answers
B.
Data collection has not started.
B.
Data collection has not started.
Answers
C.
Data collection execution failed because the device is not reachable.
C.
Data collection execution failed because the device is not reachable.
Answers
D.
Data collection is paused duo to an issue, such as a change of password.
D.
Data collection is paused duo to an issue, such as a change of password.
Answers
Suggested answer: D

Explanation:

Data Collection Status: FortiSIEM displays various icons to indicate the status of data collection for different devices.

Pause Icon: The pause icon specifically indicates that data collection is paused, but this can happen due to several reasons.

Common Cause for Pausing: One common cause for pausing data collection is an issue such as a change of password, which prevents the system from authenticating and collecting data.

Exhibit Analysis: In the provided exhibit, the presence of the pause icon next to the device suggests that data collection has encountered an issue that has caused it to pause.

Reference: FortiSIEM 6.3 User Guide, Device Management and Data Collection Status Icons section, which explains the different icons and their meanings.

Refer to the exhibit.

A FortiSIEM administrator wants to group some attributes for a report, but is not able to do so successfully.

As shown in the exhibit, why are some of the fields highlighted in red?

A.
Unique attributes cannot be grouped.
A.
Unique attributes cannot be grouped.
Answers
B.
The Event Receive Time attribute is not available for logs.
B.
The Event Receive Time attribute is not available for logs.
Answers
C.
The attribute COUNT(Matched events) is an invalid expression.
C.
The attribute COUNT(Matched events) is an invalid expression.
Answers
D.
No RAW Event Log attribute is available for devices.
D.
No RAW Event Log attribute is available for devices.
Answers
Suggested answer: A

Explanation:

Grouping Attributes in Reports: When creating reports in FortiSIEM, certain attributes can be grouped to summarize and organize the data.

Unique Attributes: Attributes that are unique for each event cannot be grouped because they do not provide a meaningful aggregation or summary.

Red Highlighting Explanation: The red highlighting in the exhibit indicates attributes that cannot be grouped together due to their unique nature. These unique attributes include Event Receive Time, Reporting IP, Event Type, Raw Event Log, and COUNT(Matched Events).

Attribute Characteristics:

Event Receive Time is unique for each event.

Reporting IP and Event Type can vary greatly, making grouping them impractical in this context.

Raw Event Log represents the unprocessed log data, which is also unique.

COUNT(Matched Events) is a calculated field, not suitable for grouping.

Reference: FortiSIEM 6.3 User Guide, Reporting section, explains the constraints on grouping attributes in reports.

Refer to the exhibit.

Which value will FortiSIEM use to populate the Event Type field?

A.
PHL_INFO
A.
PHL_INFO
Answers
B.
phPerfJob
B.
phPerfJob
Answers
C.
PH_DSV_MON_SYS_DISK_UTIL
C.
PH_DSV_MON_SYS_DISK_UTIL
Answers
D.
diskUtil
D.
diskUtil
Answers
Suggested answer: A

Explanation:

Event Type Population: In FortiSIEM, the Event Type field is populated based on specific identifiers within the raw message or event log.

Raw Message Analysis: The exhibit shows a raw message with various components, including PH_DEV_MON_SYS_DISK_UTIL, PHL_INFO, phPerfJob, and diskUtil.

Primary Event Identifier: The PH_DEV_MON_SYS_DISK_UTIL at the beginning of the raw message is the primary identifier for the event type. It categorizes the type of event, in this case, a system disk utilization monitoring event.

Event Type Field: FortiSIEM uses this primary identifier to populate the Event Type field, providing a clear categorization of the event.

Reference: FortiSIEM 6.3 User Guide, Event Processing and Event Types section, details how event types are identified and populated in the system.

An administrator defines SMTP as a critical process on a Linux server.

It the SMTP process is stopped. FortiSIEM will generate a critical event with which event type?

A.
Postfix-Mail-Stop
A.
Postfix-Mail-Stop
Answers
B.
PH_DEV_MON_PROC_STOP
B.
PH_DEV_MON_PROC_STOP
Answers
C.
PH_DEV_MON_SMTP_STOP
C.
PH_DEV_MON_SMTP_STOP
Answers
D.
Generic_SMTP_Procoss_Exit
D.
Generic_SMTP_Procoss_Exit
Answers
Suggested answer: B

Explanation:

Process Monitoring in FortiSIEM: FortiSIEM can monitor critical processes on managed devices, such as an SMTP process on a Linux server.

Event Generation: When a critical process stops, FortiSIEM generates an event to alert administrators.

Event Types: Specific event types correspond to different monitored conditions. For a stopped process, the event type PH_DEV_MON_PROC_STOP is used.

Reasoning: The name PH_DEV_MON_PROC_STOP (Device Monitoring Process Stop) is a generic event type used by FortiSIEM to indicate that any monitored process, including SMTP, has stopped.

Reference: FortiSIEM 6.3 User Guide, Event Types section, explains the predefined event types and their usage in different monitoring scenarios.

Refer to the exhibit.

An administrator is investigating a FortiSIEM license issue.

The procedure is for which offline licensing condition?

A.
The procedure is for offline license debug.
A.
The procedure is for offline license debug.
Answers
B.
The procedure is for offline license registration.
B.
The procedure is for offline license registration.
Answers
C.
The procedure is for offline license validation.
C.
The procedure is for offline license validation.
Answers
D.
The procedure is for offline license verification.
D.
The procedure is for offline license verification.
Answers
Suggested answer: B

Explanation:

Offline Licensing in FortiSIEM: FortiSIEM provides mechanisms for offline licensing to accommodate environments without direct internet access.

License Tool Command: The command ./phLicenseTool --collect license_req.dat is used to collect license information necessary for offline registration.

Procedure Analysis: The exhibit shows the output of this command, which indicates the collection of license information to a file named license_req.dat.

Offline License Registration: This collected data file is then typically uploaded to the FortiSIEM support portal or provided to the FortiSIEM support team for processing and generating a license file.

Reference: FortiSIEM 6.3 Administration Guide, Licensing section, details the procedures for both online and offline license registration, including the use of the phLicenseTool for offline scenarios.

Total 50 questions
Go to page: of 5