ExamGecko
Home Home / Fortinet / NSE6_FSR-7.3

Fortinet NSE6_FSR-7.3 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Which service on FortiSOAR is the playbook scheduler?

A.

cyops-torccat

A.

cyops-torccat

Answers
B.

colcrybeatd

B.

colcrybeatd

Answers
C.

celeryd

C.

celeryd

Answers
D.

uwsgi

D.

uwsgi

Answers
Suggested answer: B

Explanation:

In FortiSOAR, the service responsible for the playbook scheduling functionality is colcrybeatd. This service manages the timing and execution of scheduled playbooks, allowing for the automation of various tasks at specified intervals. It ensures that playbooks execute according to their configured schedules, which can include tasks such as data ingestion, threat detection, or incident response actions. Proper functioning of this service is essential for the reliable automation of time-dependent processes within FortiSOAR.

A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)

A.

Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.

A.

Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.

Answers
B.

View the user's effective role permissions, and then investigate which role is providing that access.

B.

View the user's effective role permissions, and then investigate which role is providing that access.

Answers
C.

Remove all record ownership that is assigned to the user.

C.

Remove all record ownership that is assigned to the user.

Answers
D.

Review the user's learn hierarchy to ensure that the appropriate relationships are configured.

D.

Review the user's learn hierarchy to ensure that the appropriate relationships are configured.

Answers
Suggested answer: B, D

Explanation:

To audit and restrict a user's access within FortiSOAR, particularly in response to unauthorized access reports, it's necessary to review the user's effective role permissions. This involves checking which roles grant the user access to the System Configuration module and adjusting as needed. Additionally, reviewing the user's team hierarchy ensures that the user's access aligns with the organization's policies. Misconfigurations in team relationships can sometimes inadvertently provide elevated access; hence, confirming that the team setup is correct is a critical part of the auditing process.

An administrator is issuing the following command on a node trying to join a FortiSOAR duster as a standby: csadm ha join-cluster --status active ---role secondary --primary-node 10.0.1.160

The node fails to join the cluster. What is the issue?

A.

The role value should be worker.

A.

The role value should be worker.

Answers
B.

The primary node needs to be resolvable via FQDN.

B.

The primary node needs to be resolvable via FQDN.

Answers
C.

The IP address should be for secondary-node Instead of primary-node.

C.

The IP address should be for secondary-node Instead of primary-node.

Answers
D.

The status value should be passive.

D.

The status value should be passive.

Answers
Suggested answer: D

Explanation:

When joining a FortiSOAR cluster as a standby node, the correct status value should be passive. Using active would imply that the node is trying to join as an active node, which could cause conflicts in the cluster setup. In FortiSOAR, standby nodes must be set as passive to ensure they are recognized correctly and to avoid conflicts with the primary node or other active nodes within the cluster. Therefore, setting the status to passive will resolve the issue and allow the node to join the cluster as intended.

When deleting a user account on FortiSOAR, you must enter the user ID in which file on FortiSOAR?

A.

userDelete.txt.

A.

userDelete.txt.

Answers
B.

config_yml

B.

config_yml

Answers
C.

scripts

C.

scripts

Answers
D.

usersToDelete.txt

D.

usersToDelete.txt

Answers
Suggested answer: D

Explanation:

When deleting a user account in FortiSOAR, the user ID must be entered into the usersToDelete.txt file. This file is specifically used to list users that are marked for deletion. Once the user IDs are listed in this file, the system can process the deletion of these accounts as part of its user management operations. This method ensures that only specified users are deleted, as referenced in FortiSOAR's administrative controls.

Which two statements about upgrading a FortiSOAR HA cluster are true7 (Choose two.)

A.

Nodes can be upgraded while the primary node or secondary node are in the HA cluster.

A.

Nodes can be upgraded while the primary node or secondary node are in the HA cluster.

Answers
B.

Upgrading a FortiSOAR HA cluster requires no downtime.

B.

Upgrading a FortiSOAR HA cluster requires no downtime.

Answers
C.

The upgrade procedure for an active-active cluster and an active-passive cluster are the same.

C.

The upgrade procedure for an active-active cluster and an active-passive cluster are the same.

Answers
D.

It is recommended that the passive secondary node be upgraded first, and then the active primary node.

D.

It is recommended that the passive secondary node be upgraded first, and then the active primary node.

Answers
Suggested answer: C, D

Explanation:

Upgrading a FortiSOAR HA cluster follows the same procedure regardless of whether it is configured in an active-active or active-passive setup. The process generally involves upgrading one node at a time to minimize service disruption. Best practices recommend upgrading the passive secondary node first before moving to the active primary node. This sequence helps maintain cluster stability and ensures that at least one node remains operational during the upgrade.

Which SMS vendor does FortiSOAR support for two-factor authentication?

A.

Twilio

A.

Twilio

Answers
B.

Google Authenticator

B.

Google Authenticator

Answers
C.

2factor

C.

2factor

Answers
D.

Telesign

D.

Telesign

Answers
Suggested answer: D

Explanation:

For two-factor authentication (2FA) via SMS, FortiSOAR supports integration with Telesign. This vendor provides SMS-based 2FA services, enabling FortiSOAR to leverage Telesign's API for sending verification codes as part of its security features. Telesign's service is compatible with FortiSOAR, ensuring secure user authentication when accessing the platform or certain features.

Which three actions can be performed from within the war room? (Choose three)

A.

View graphical representation of all records linked to an incident in the Artifacts lab

A.

View graphical representation of all records linked to an incident in the Artifacts lab

Answers
B.

Change the room's status to Escalated to enforce hourly updates.

B.

Change the room's status to Escalated to enforce hourly updates.

Answers
C.

Investigate issues by tagging results as evidence.

C.

Investigate issues by tagging results as evidence.

Answers
D.

Use the Task Manager tab to create, manage, assign, and track tasks.

D.

Use the Task Manager tab to create, manage, assign, and track tasks.

Answers
E.

Integrate a third-party instant messenger directly into the collaboration workspace.

E.

Integrate a third-party instant messenger directly into the collaboration workspace.

Answers
Suggested answer: A, C, D

Explanation:

In FortiSOAR's War Room, users can perform several actions to manage incidents effectively. They can view a graphical representation of records linked to an incident in the Artifacts lab, which helps visualize connections and dependencies. Additionally, the War Room supports tagging investigation results as evidence, allowing for a structured approach to incident documentation. Users can also manage tasks via the Task Manager tab, facilitating task creation, assignment, and tracking within the incident response workflow.

Which two statements about appliance users are true? (Choose two.)

A.

Appliance users do not have a login ID and do not add to the license count.

A.

Appliance users do not have a login ID and do not add to the license count.

Answers
B.

Appliance users represent non-human users.

B.

Appliance users represent non-human users.

Answers
C.

Appliance users use two-factor authentication for messages sent to the API.

C.

Appliance users use two-factor authentication for messages sent to the API.

Answers
D.

Appliance users use time-expiring tokens for primary authentication.

D.

Appliance users use time-expiring tokens for primary authentication.

Answers
Suggested answer: A, B

Explanation:

In FortiSOAR, appliance users are accounts that represent non-human entities, such as system processes or integrations. These users do not require login IDs and therefore do not contribute to the licensing user count. Appliance users are configured for backend tasks or to interact with external systems, enabling automated processes without consuming standard user licenses. This approach optimizes system resources and keeps licensing costs manageable.

Which two statements about Elasticsearch are true? (Choose two.)

A.

Elasticsearch allows you to store, search, and analyze huge volumes of data quickly. In near real time, and return answers in milliseconds.

A.

Elasticsearch allows you to store, search, and analyze huge volumes of data quickly. In near real time, and return answers in milliseconds.

Answers
B.

To change the location of your Elasticsearch instance from the local instance to a remote location, you must update the falcon. conf file.

B.

To change the location of your Elasticsearch instance from the local instance to a remote location, you must update the falcon. conf file.

Answers
C.

The minimum version of the Elasticsearch cluster must be 6.0.2. if you want to externalize the Elasticsearch data.

C.

The minimum version of the Elasticsearch cluster must be 6.0.2. if you want to externalize the Elasticsearch data.

Answers
D.

The global search mechanism in FortiSOAR leverages an Elasticsearch database to achieve rapid, efficient searches across the entire record system.

D.

The global search mechanism in FortiSOAR leverages an Elasticsearch database to achieve rapid, efficient searches across the entire record system.

Answers
Suggested answer: A, D

Explanation:

Elasticsearch in FortiSOAR is used for its robust data handling capabilities, allowing rapid storage, searching, and analysis of vast amounts of data in near real-time. Its integration with FortiSOAR's global search enables efficient querying across all records, providing quick response times and a seamless user experience. The Elasticsearch database is crucial for handling extensive datasets and delivering swift search results, making it integral to FortiSOAR's performance and data management capabilities.

Refer to the exhibit.

The former primary node was relegated to the secondary rote but is stuck in the Faulted state.

Which two steps must you take to restore operation in the high availability (HA) cluster? (Choose two.)

A.

Perform a fire drill to test the database integrity of the node that is in the Faulted state.

A.

Perform a fire drill to test the database integrity of the node that is in the Faulted state.

Answers
B.

On the node that is in the Faulted state, enter the csadm ha leave-cluster command.

B.

On the node that is in the Faulted state, enter the csadm ha leave-cluster command.

Answers
C.

Enter the csadm ha join-cluster command to have the node that is in the Faulted state rejoin the HA cluster as a secondary node.

C.

Enter the csadm ha join-cluster command to have the node that is in the Faulted state rejoin the HA cluster as a secondary node.

Answers
D.

Restart the node that is in the Faulted state to trigger another election.

D.

Restart the node that is in the Faulted state to trigger another election.

Answers
Suggested answer: B, C

Explanation:

In a FortiSOAR HA cluster, if the former primary node is relegated to a secondary role but is stuck in a Faulted state, it indicates that the node has lost sync or faced a failure during a role change. To restore its functionality, first, you should remove it from the cluster using the csadm ha leave-cluster command. Once it has left the cluster, you can use the csadm ha join-cluster command to re-add the node as a secondary node. This process will allow it to sync back up with the cluster and resume its role as intended.

Total 39 questions
Go to page: of 4