ExamGecko
Home Home / Fortinet / NSE5_FSM-6.3

Fortinet NSE5_FSM-6.3 Practice Test - Questions Answers, Page 5

Question list
Search
Search

If an incident's status is Cleared, what does this mean?

A.
Two hours have passed since the incident occurred and the incident has not reoccurred.
A.
Two hours have passed since the incident occurred and the incident has not reoccurred.
Answers
B.
A clear condition set on a rule was satisfied.
B.
A clear condition set on a rule was satisfied.
Answers
C.
A security rule issue has been resolved.
C.
A security rule issue has been resolved.
Answers
D.
The incident was cleared by an operator.
D.
The incident was cleared by an operator.
Answers
Suggested answer: B

Explanation:

Incident Status in FortiSIEM: The status of an incident indicates its current state and helps administrators track and manage incidents effectively.

Cleared Status: When an incident's status is 'Cleared,' it means that a specific condition set to clear the incident has been satisfied.

Clear Condition: This is typically a predefined condition that indicates the issue causing the incident has been resolved or no longer exists.

Automatic vs. Manual Clearance: While some incidents may be cleared automatically based on clear conditions, others might be manually cleared by an operator.

Reference: FortiSIEM 6.3 User Guide, Incident Management section, detailing the various incident statuses and the conditions that lead to an incident being marked as 'Cleared.'

Refer to the exhibit.

A FortiSIEM is continuously receiving syslog events from a FortiGate firewall The FortiSlfcM administrator is trying to search the raw event logs for the last two hours that contain the keyword tcp . However, the administrator is getting no results from the search.

Based on the selected filters shown in the exhibit, why are there no search results?

A.
The keyword is case sensitive Instead of typing TCP in the Value field. the administrator should type tcp.
A.
The keyword is case sensitive Instead of typing TCP in the Value field. the administrator should type tcp.
Answers
B.
In the Time section, the administrator selected the Relative Last option, and in the drop-down lists, selected 2 and Hours as the lime period The time period should be 24 hours.
B.
In the Time section, the administrator selected the Relative Last option, and in the drop-down lists, selected 2 and Hours as the lime period The time period should be 24 hours.
Answers
C.
The administrator selected - in the Operator column That a the wrong operator.
C.
The administrator selected - in the Operator column That a the wrong operator.
Answers
D.
The administrator selected AND in the Next drop-down list. This is the wrong boolean operator.
D.
The administrator selected AND in the Next drop-down list. This is the wrong boolean operator.
Answers
Suggested answer: A

Explanation:

Case Sensitivity in Searches: In FortiSIEM, search queries, including those for raw event logs, are case sensitive. This means that keywords must be entered exactly as they appear in the logs.

Keyword Mismatch: The exhibit shows the keyword 'TCP' in the Value field. If the actual events use 'tcp' (lowercase), the search will return no results because of the case mismatch.

Correct Keyword: To match the keyword correctly, the administrator should enter 'tcp' in the Value field.

Reference: FortiSIEM 6.3 User Guide, Search and Filtering section, which discusses the importance of case sensitivity in search queries.

Which FortiSIEM components are capable of performing device discovery?

A.
FortiSIEM Windows agent
A.
FortiSIEM Windows agent
Answers
B.
Worker
B.
Worker
Answers
C.
FortiSIEM Linux agent
C.
FortiSIEM Linux agent
Answers
D.
Collector
D.
Collector
Answers
Suggested answer: D

Explanation:

Device Discovery in FortiSIEM: Device discovery is the process by which FortiSIEM identifies and adds devices to its management scope.

Role of Collectors: Collectors are responsible for gathering data from network devices, including discovering new devices in the network.

Functionality: Collectors use protocols such as SNMP, WMI, and others to discover devices and gather their details.

Capability: While agents (Windows and Linux) primarily gather data from their host systems, the collectors actively discover devices across the network.

Reference: FortiSIEM 6.3 User Guide, Device Discovery section, which details the role of collectors in discovering network devices.

Which discovery scan type is prone to miss a device, if the device is quiet and the entry foe that device is not present in the ARP table of adjacent devices?

A.
CMDB scan
A.
CMDB scan
Answers
B.
L2 scan
B.
L2 scan
Answers
C.
Range scan
C.
Range scan
Answers
D.
Smart scan
D.
Smart scan
Answers
Suggested answer: B

Explanation:

Discovery Scan Types: FortiSIEM uses various scan types to discover devices on a network.

Layer 2 (L2) Scan: An L2 scan discovers devices based on ARP tables and MAC address information from adjacent devices.

Limitation: If a device is quiet (not actively communicating) and its entry is not present in the ARP table of adjacent devices, the L2 scan may miss it.

Other Scan Types:

CMDB Scan: Based on the existing Configuration Management Database (CMDB) entries.

Range Scan: Scans a specified IP range for devices.

Smart Scan: Uses a combination of methods to discover devices.

Reference: FortiSIEM 6.3 User Guide, Device Discovery section, which explains the different types of discovery scans and their characteristics.

What are the four possible incident status values?

A.
Active, dosed, cleared, open
A.
Active, dosed, cleared, open
Answers
B.
Active, cleared, cleared manually, system cleared
B.
Active, cleared, cleared manually, system cleared
Answers
C.
Active, closed, manual, resolved
C.
Active, closed, manual, resolved
Answers
D.
Active, auto cleared, manual, false positive
D.
Active, auto cleared, manual, false positive
Answers
Suggested answer: A

Explanation:

Incident Status Values: Incident statuses in FortiSIEM help administrators track and manage the lifecycle of incidents from detection to resolution.

Four Possible Status Values:

Active: Indicates that the incident is currently ongoing and needs attention.

Closed: Indicates that the incident has been resolved or addressed.

Cleared: Indicates that the incident has been resolved automatically based on predefined conditions.

Open: Indicates that the incident is acknowledged and under investigation but not yet resolved.

Usage: These statuses help in prioritizing and tracking incidents effectively, ensuring that all incidents are appropriately managed.

Reference: FortiSIEM 6.3 User Guide, Incident Management section, which details the different status values and their meanings.

Refer to the exhibit.

What do the yellow stars listed in the Monitor column indicate?

A.
A yellow star indicates that a metric was applied during discovery, and data has been collected successfully
A.
A yellow star indicates that a metric was applied during discovery, and data has been collected successfully
Answers
B.
A yellow star indicates that a metric was applied during discovery, but data collection has not started
B.
A yellow star indicates that a metric was applied during discovery, but data collection has not started
Answers
C.
A yellow star indicates that a metric was applied during discovery, but FortiSIEM is unable to collect data.
C.
A yellow star indicates that a metric was applied during discovery, but FortiSIEM is unable to collect data.
Answers
D.
A yellow star indicates that a metric was not applied during discovery and, therefore, FortiSEIM was unable to collect data.
D.
A yellow star indicates that a metric was not applied during discovery and, therefore, FortiSEIM was unable to collect data.
Answers
Suggested answer: A

Explanation:

Monitor Column Indicators: In FortiSIEM, the Monitor column displays the status of various metrics applied during the discovery process.

Yellow Star Meaning: A yellow star next to a metric indicates that the metric was successfully applied during discovery and data has been collected for that metric.

Successful Data Collection: This visual indicator helps administrators quickly identify which metrics are active and have data available for analysis.

Reference: FortiSIEM 6.3 User Guide, Device Monitoring section, which explains the significance of different icons and indicators in the Monitor column.

Refer to the exhibit.

A FortiSIEM administrator wants to collect both SIEM event logs and performance and availability metrics (PAM) events from a Microsoft Windows server

Which protocol should the administrator select in the Access Protocol drop-down list so that FortiSIEM will collect both SIEM and PAM events?

A.
TELNET
A.
TELNET
Answers
B.
WMI
B.
WMI
Answers
C.
LDAPS
C.
LDAPS
Answers
D.
LDAP start TLS
D.
LDAP start TLS
Answers
Suggested answer: B

Explanation:

Collecting SIEM and PAM Events: To collect both SIEM event logs and Performance and Availability Monitoring (PAM) events from a Microsoft Windows server, a suitable protocol must be selected.

WMI Protocol: Windows Management Instrumentation (WMI) is the appropriate protocol for this task.

SIEM Event Logs: WMI can collect security, application, and system logs from Windows devices.

PAM Events: WMI can also gather performance metrics, such as CPU usage, memory utilization, and disk activity.

Comprehensive Data Collection: Using WMI ensures that both types of data are collected efficiently from the Windows server.

Reference: FortiSIEM 6.3 User Guide, Data Collection Methods section, which details the use of WMI for collecting various types of logs and performance metrics.

Which database is used for storing anomaly data, that is calculated for different parameters, such as traffic and device resource usage running averages, and standard deviation values?

A.
Profile DB
A.
Profile DB
Answers
B.
Event DB
B.
Event DB
Answers
C.
CMDB
C.
CMDB
Answers
D.
SVN DB
D.
SVN DB
Answers
Suggested answer: A

Explanation:

Anomaly Data Storage: Anomaly data, including running averages and standard deviation values for different parameters such as traffic and device resource usage, is stored in a specific database.

Profile DB: The Profile DB is used to store this type of anomaly data.

Function: It maintains statistical profiles and baselines for monitored parameters, which are used to detect anomalies and deviations from normal behavior.

Significance: Storing anomaly data in the Profile DB allows FortiSIEM to perform advanced analytics and alerting based on deviations from established baselines.

Reference: FortiSIEM 6.3 User Guide, Database Architecture section, which describes the purpose and contents of the Profile DB in storing anomaly and baseline data.

What is a prerequisite for FortiSIEM Linux agent installation?

A.
The web server must be installed on the Linux server being monitored
A.
The web server must be installed on the Linux server being monitored
Answers
B.
The auditd service must be installed on the Linux server being monitored
B.
The auditd service must be installed on the Linux server being monitored
Answers
C.
The Linux agent manager server must be installed.
C.
The Linux agent manager server must be installed.
Answers
D.
Both the web server and the audit service must be installed on the Linux server being monitored
D.
Both the web server and the audit service must be installed on the Linux server being monitored
Answers
Suggested answer: B

Explanation:

FortiSIEM Linux Agent: The FortiSIEM Linux agent is used to collect logs and performance metrics from Linux servers and send them to the FortiSIEM system.

Prerequisite for Installation: The auditd service, which is the Linux Audit Daemon, must be installed and running on the Linux server to capture and log security-related events.

auditd Service: This service collects and logs security events on Linux systems, which are essential for monitoring and analysis by FortiSIEM.

Importance of auditd: Without the auditd service, the FortiSIEM Linux agent will not be able to collect the necessary event data from the Linux server.

Reference: FortiSIEM 6.3 User Guide, Linux Agent Installation section, which lists the prerequisites and steps for installing the FortiSIEM Linux agent.

A customer is experiencing slow performance while executing long, adhoc analytic searches Which FortiSIEM component can make the searches run faster?

A.
Correlation worker
A.
Correlation worker
Answers
B.
Event worker
B.
Event worker
Answers
C.
Storage worker
C.
Storage worker
Answers
D.
Query worker
D.
Query worker
Answers
Suggested answer: D

Explanation:

Component Roles in FortiSIEM: Different components in FortiSIEM have specific roles and responsibilities, which contribute to the overall performance and functionality of the system.

Query Worker: The query worker component is specifically designed to handle and optimize search queries within FortiSIEM.

Function: It processes search requests and executes analytic searches efficiently, handling large volumes of data to provide quick results.

Optimization: By improving the efficiency of query execution, the query worker can significantly speed up long, ad hoc analytic searches, addressing performance issues.

Performance Impact: Utilizing the query worker ensures that searches are handled by a component optimized for such tasks, reducing the load on other components and improving overall system performance.

Reference: FortiSIEM 6.3 User Guide, System Components section, which describes the roles of different workers, including the query worker, and their impact on system performance.

Total 50 questions
Go to page: of 5