ExamGecko
Home Home / Fortinet / NSE5_FSM-6.3

Fortinet NSE5_FSM-6.3 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Which FortiSIEM feature must you use to produce a report on which FortiGate devices in your environment are running which firmware version?

A.
Run an analytic search.
A.
Run an analytic search.
Answers
B.
Run a query using the Inventory tab.
B.
Run a query using the Inventory tab.
Answers
C.
Run a baseline report.
C.
Run a baseline report.
Answers
D.
Run a CMDB report
D.
Run a CMDB report
Answers
Suggested answer: B

Explanation:

Feature Overview: FortiSIEM provides several tools for querying and reporting on device information within an environment.

Inventory Tab: The Inventory tab is specifically designed to display detailed information about devices, including their firmware versions.

Query Functionality: Within the Inventory tab, you can run queries to filter and display devices based on specific attributes, such as the firmware version for FortiGate devices.

Report Generation: By running a query in the Inventory tab, you can produce a report that lists the FortiGate devices and their corresponding firmware versions.

Reference: FortiSIEM 6.3 User Guide, Inventory Management section, explains how to use the Inventory tab to query and report on device attributes.

Which statement about global thresholds and per device thresholds is true?

A.
FortiSIEM uses global and per device thresholds tor all performance metrics.
A.
FortiSIEM uses global and per device thresholds tor all performance metrics.
Answers
B.
FortiSIEM uses global thresholds for all performance metrics.
B.
FortiSIEM uses global thresholds for all performance metrics.
Answers
C.
FortiSIEM uses fixed hardcoded thresholds for all performance metrics.
C.
FortiSIEM uses fixed hardcoded thresholds for all performance metrics.
Answers
D.
FortiSIEM uses global thresholds for all security metrics.
D.
FortiSIEM uses global thresholds for all security metrics.
Answers
Suggested answer: A

Explanation:

Threshold Management: FortiSIEM uses thresholds to generate alerts and incidents based on performance and security metrics.

Global Thresholds: These are default thresholds applied to all devices and metrics across the system, providing a baseline for alerts.

Per Device Thresholds: These thresholds can be customized for individual devices, allowing for more granular control and tailored monitoring based on specific device characteristics and requirements.

Usage in Performance Metrics: Both global and per device thresholds are used for performance metrics to ensure comprehensive and precise monitoring.

Reference: FortiSIEM 6.3 User Guide, Thresholds and Alerts section, details the application of global and per device thresholds for performance and security metrics.

In FortiSIEM enterprise licensing mode, it the link between the collector and data center FortiSlEM cluster is down, what happens?

A.
The collector drops incoming events like syslog. but stops performance collection.
A.
The collector drops incoming events like syslog. but stops performance collection.
Answers
B.
The collector processes stop, and events ate dropped.
B.
The collector processes stop, and events ate dropped.
Answers
C.
The collector continues performance collection of devices, but slops receiving syslog.
C.
The collector continues performance collection of devices, but slops receiving syslog.
Answers
D.
The collector buffers events
D.
The collector buffers events
Answers
Suggested answer: C

Explanation:

Enterprise Licensing Mode: In FortiSIEM enterprise licensing mode, collectors are deployed in remote sites to gather and forward data to the central FortiSIEM cluster located in the data center.

Collector Functionality: Collectors are responsible for receiving logs, events (e.g., syslog), and performance metrics from devices.

Link Down Scenario: When the link between the collector and the FortiSIEM cluster is down, the collector needs a mechanism to ensure no data is lost during the disconnection.

Event Buffering: The collector buffers the events locally until the connection is restored, ensuring that no incoming events are lost. This buffered data is then forwarded to the FortiSIEM cluster once the link is re-established.

Reference: FortiSIEM 6.3 User Guide, Data Collection and Buffering section, explains the behavior of collectors during network disruptions.

Which two FortiSIEM components work together to provide real-time event correlation?

A.
Supervisor and worker
A.
Supervisor and worker
Answers
B.
Collector and Windows agent
B.
Collector and Windows agent
Answers
C.
Worker and collector
C.
Worker and collector
Answers
D.
Supervisor and collector
D.
Supervisor and collector
Answers
Suggested answer: C

Explanation:

FortiSIEM Architecture: The FortiSIEM architecture includes several components such as Supervisors, Workers, Collectors, and Agents, each playing a distinct role in the SIEM ecosystem.

Real-Time Event Correlation: Real-time event correlation is a critical function that involves analyzing and correlating incoming events to detect patterns indicative of security incidents or operational issues.

Role of Supervisor and Worker:

Supervisor: The Supervisor oversees the entire FortiSIEM system, coordinating the processing and analysis of events.

Worker: Workers are responsible for processing and correlating the events received from Collectors and Agents.

Collaboration for Correlation: Together, the Supervisor and Worker components perform real-time event correlation by distributing the load and ensuring efficient processing of events to identify incidents in real-time.

Reference: FortiSIEM 6.3 User Guide, Event Correlation and Processing section, details how the Supervisor and Worker components collaborate for real-time event correlation.

FortiSIEM is deployed in disaster recovery mode.

When disaster strikes, which two tasks must you perform manually to achieve a successful disaster recovery operation? (Choose two.)

A.
Promote the secondary workers to the primary rotes using the phSecworker2priworker command.
A.
Promote the secondary workers to the primary rotes using the phSecworker2priworker command.
Answers
B.
Promote the secondary supervisor to the primary role using the phSecondary2primary command.
B.
Promote the secondary supervisor to the primary role using the phSecondary2primary command.
Answers
C.
Change the DNS configuration to ensure that users, devices, and collectors log in to the secondary FortiSIEM.
C.
Change the DNS configuration to ensure that users, devices, and collectors log in to the secondary FortiSIEM.
Answers
D.
Change the configuration for shared storage NFS configured for EventDB to the secondary FortiSIEM.
D.
Change the configuration for shared storage NFS configured for EventDB to the secondary FortiSIEM.
Answers
Suggested answer: A, C

Explanation:

Disaster Recovery Mode: FortiSIEM's disaster recovery (DR) mode ensures that there is a backup system ready to take over in case the primary system fails.

Manual Tasks for DR Operation: In the event of a disaster, certain tasks must be performed manually to ensure a smooth transition to the secondary system.

Promoting the Secondary Supervisor:

Use the command phSecondary2primary to promote the secondary supervisor to the primary role. This command reconfigures the secondary supervisor to take over as the primary supervisor, ensuring continuity in management and coordination.

Changing DNS Configuration:

Update the DNS configuration to direct all users, devices, and collectors to the secondary FortiSIEM instance. This ensures that all components in the environment can communicate with the newly promoted primary supervisor without manual reconfiguration of individual devices.

Reference: FortiSIEM 6.3 Administration Guide, Disaster Recovery section, provides detailed steps on promoting the secondary supervisor and updating DNS configurations during a disaster recovery operation.

IF the reported packet loss is between 50% and 98%. which status is assigned to the device in the Availability column of summary dashboard?

A.
Up status is assigned because of received packets.
A.
Up status is assigned because of received packets.
Answers
B.
Critical status is assigned because of reduction in number of packets received.
B.
Critical status is assigned because of reduction in number of packets received.
Answers
C.
Degraded status is assigned because of packet loss
C.
Degraded status is assigned because of packet loss
Answers
D.
Down status is assigned because of packet loss.
D.
Down status is assigned because of packet loss.
Answers
Suggested answer: B

Explanation:

Device Status in FortiSIEM: FortiSIEM assigns different statuses to devices based on their operational state and performance metrics.

Packet Loss Impact: The reported packet loss percentage directly influences the status assigned to a device. Packet loss between 50% and 98% indicates significant network issues that affect the device's performance.

Degraded Status: When packet loss is between 50% and 98%, FortiSIEM assigns a 'Degraded' status to the device. This status indicates that the device is experiencing substantial packet loss, which impairs its performance but does not render it completely non-functional.

Reasoning: The 'Degraded' status helps administrators identify devices with serious performance issues that need attention but are not entirely down.

Reference: FortiSIEM 6.3 User Guide, Device Availability and Status section, explains the criteria for assigning different statuses based on performance metrics such as packet loss.

In me FortiSIEM CLI. which command must you use to determine whether or not syslog is being received from a network device?

A.
tcpdump
A.
tcpdump
Answers
B.
OphSyslogRecorder
B.
OphSyslogRecorder
Answers
C.
Onetcat
C.
Onetcat
Answers
D.
phDeviceTest
D.
phDeviceTest
Answers
Suggested answer: A

Explanation:

Syslog Reception Verification: To verify whether syslog messages are being received from a network device, a network packet capture tool can be used.

tcpdump Command: tcpdump is a powerful command-line packet analyzer tool available in Unix-like operating systems. It allows administrators to capture and analyze network traffic.

Usage: By using tcpdump with the appropriate filters (e.g., port 514 for syslog), administrators can monitor the incoming syslog messages in real-time to verify if they are being received.

Example Command: tcpdump -i <interface> port 514 captures the syslog messages on the specified network interface.

Reference: FortiSIEM 6.3 User Guide, CLI Commands section, which details the usage of tcpdump for network traffic analysis and verification of syslog reception.

An administrator wants to search for events received from Linux and Windows agents.

Which attribute should the administrator use in search filters, to view events received from agents only.

A.
External Event Receive Protocol
A.
External Event Receive Protocol
Answers
B.
Event Received Proto Agents
B.
Event Received Proto Agents
Answers
C.
External Event Receive Raw Logs
C.
External Event Receive Raw Logs
Answers
D.
External Event Receive Agents
D.
External Event Receive Agents
Answers
Suggested answer: D

Explanation:

Search Filters in FortiSIEM: When searching for specific events, administrators can use various attributes to filter the results.

Attribute for Agent Events: To view events received specifically from Linux and Windows agents, the attribute External Event Receive Agents should be used.

Function: This attribute filters events that are received from agents, distinguishing them from events received through other protocols or sources.

Search Efficiency: Using this attribute helps the administrator focus on events collected by FortiSIEM agents, making the search results more relevant and targeted.

Reference: FortiSIEM 6.3 User Guide, Event Search and Filters section, which describes the available attributes and their usage for filtering search results.

How is a subpattern for a rule defined?

A.
Filters, Aggregation, Group by definitions
A.
Filters, Aggregation, Group by definitions
Answers
B.
Filters, Group By definitions, Threshold
B.
Filters, Group By definitions, Threshold
Answers
C.
Filters, Threshold, Time Window definitions
C.
Filters, Threshold, Time Window definitions
Answers
D.
Filters, Aggregation, Time Window definitions
D.
Filters, Aggregation, Time Window definitions
Answers
Suggested answer: C

What are the four categories of incidents?

A.
Devices, users, high risk, and low risk
A.
Devices, users, high risk, and low risk
Answers
B.
Performance, devices, high risk, and low risk
B.
Performance, devices, high risk, and low risk
Answers
C.
Performance, availability, security, and change
C.
Performance, availability, security, and change
Answers
D.
Security, change, high risk, and low risk
D.
Security, change, high risk, and low risk
Answers
Suggested answer: C

Explanation:

Incident Categories in FortiSIEM: Incidents in FortiSIEM are categorized to help administrators quickly identify and prioritize the type of issue.

Four Main Categories:

Performance: Incidents related to the performance of devices and applications, such as high CPU usage or memory utilization.

Availability: Incidents affecting the availability of services or devices, such as downtime or connectivity issues.

Security: Incidents related to security events, such as failed login attempts, malware detection, or unauthorized access.

Change: Incidents triggered by changes in the configuration or state of devices, such as new software installations or configuration modifications.

Importance of Categorization: These categories help in the efficient management and response to different types of incidents, allowing for better resource allocation and quicker resolution.

Reference: FortiSIEM 6.3 User Guide, Incident Management section, which details the different categories of incidents and their significance.

Total 50 questions
Go to page: of 5