ExamGecko
Home Home / Fortinet / NSE7_ADA-6.3

Fortinet NSE7_ADA-6.3 Practice Test - Questions Answers

Question list
Search
Search

Which syntax will register a collector to the supervisor?

A.
phProvisionCollector --add
A.
phProvisionCollector --add
Answers
B.
phProvisionCollector --add
B.
phProvisionCollector --add
Answers
C.
phProvisionCollector --add
C.
phProvisionCollector --add
Answers
D.
phProvisionCollector --add
D.
phProvisionCollector --add
Answers
Suggested answer: B

Explanation:

The syntax that will register a collector to the supervisor is phProvisionCollector --add <supervisor IP>. This command will initiate the registration process between the collector and the supervisor, and exchange certificates and configuration information. The <supervisor IP> parameter is the IP address of the supervisor node.

What is Tactic in the MITRE ATT&CK framework?

A.
Tactic is how an attacker plans to execute the attack
A.
Tactic is how an attacker plans to execute the attack
Answers
B.
Tactic is what an attacker hopes to achieve
B.
Tactic is what an attacker hopes to achieve
Answers
C.
Tactic is the tool that the attacker uses to compromise a system
C.
Tactic is the tool that the attacker uses to compromise a system
Answers
D.
Tactic is a specific implementation of the technique
D.
Tactic is a specific implementation of the technique
Answers
Suggested answer: B

Explanation:

Tactic is what an attacker hopes to achieve in the MITRE ATT&CK framework. Tactic is a high-level category of adversary behavior that describes their objective or goal. For example, some tactics are Initial Access, Persistence, Lateral Movement, Exfiltration, etc. Each tactic consists of one or more techniques that describe how an attacker can accomplish that tactic.

Refer to the exhibit.

If the Z-score for this rule is greater than or equal to three, what does this mean?

A.
The rate of firewall connection is optimum.
A.
The rate of firewall connection is optimum.
Answers
B.
The rate of firewall connection is above the historical average value.
B.
The rate of firewall connection is above the historical average value.
Answers
C.
The rate of firewall connection is above the current average value.
C.
The rate of firewall connection is above the current average value.
Answers
D.
The rate of firewall connection is below historical average value.
D.
The rate of firewall connection is below historical average value.
Answers
Suggested answer: B

Explanation:

If the Z-score for this rule is greater than or equal to three, it means that the rate of firewall connection is above the historical average value. The Z-score is a measure of how many standard deviations a value is away from the mean of a distribution. A Z-score of three or more indicates that the value is significantly higher than the mean, which implies an anomaly or deviation from normal behavior.

Why can collectors not be defined before the worker upload address is set on the supervisor?

A.
Collectors can only upload data to a worker, and the supervisor is not a worker
A.
Collectors can only upload data to a worker, and the supervisor is not a worker
Answers
B.
To ensure that the service provider has deployed at least one worker along with a supervisor
B.
To ensure that the service provider has deployed at least one worker along with a supervisor
Answers
C.
Collectors receive the worker upload address during the registration process
C.
Collectors receive the worker upload address during the registration process
Answers
D.
To ensure that the service provider has deployed a NFS server
D.
To ensure that the service provider has deployed a NFS server
Answers
Suggested answer: C

Explanation:

Collectors cannot be defined before the worker upload address is set on the supervisor because collectors receive the worker upload address during the registration process. The worker upload address is a list of IP addresses of worker nodes that can receive event data from collectors. The supervisor provides this list to collectors when they register with it, so that collectors can upload event data to any node in the list.

Which three statements about collector communication with the FortiSIEM cluster are true? (Choose three.)

A.
The only communication between the collector and the supervisor is during the registration process.
A.
The only communication between the collector and the supervisor is during the registration process.
Answers
B.
Collectors communicate periodically with the supervisor node.
B.
Collectors communicate periodically with the supervisor node.
Answers
C.
The supervisor periodically checks the health of the collector.
C.
The supervisor periodically checks the health of the collector.
Answers
D.
The supervisor does not initiate any connections to the collector node.
D.
The supervisor does not initiate any connections to the collector node.
Answers
E.
Collectors upload event data to any node in the worker upload list, but report their health directly to the supervisor node.
E.
Collectors upload event data to any node in the worker upload list, but report their health directly to the supervisor node.
Answers
Suggested answer: B, C, E

Explanation:

The statements about collector communication with the FortiSIEM cluster that are true are:

Collectors communicate periodically with the supervisor node. Collectors send heartbeat messages to the supervisor every 30 seconds to report their status and configuration.

The supervisor periodically checks the health of the collector. The supervisor monitors the heartbeat messages from collectors and alerts if there is any issue with their connectivity or performance.

Collectors upload event data to any node in the worker upload list, but report their health directly to the supervisor node. Collectors use a round-robin algorithm to distribute event data among worker nodes in the worker upload list, which is provided by the supervisor during registration. However, collectors only report their health and status to the supervisor node.

How can you invoke an integration policy on FortiSIEM rules?

A.
Through Notification Policy settings
A.
Through Notification Policy settings
Answers
B.
Through Incident Notification settings
B.
Through Incident Notification settings
Answers
C.
Through remediation scripts
C.
Through remediation scripts
Answers
D.
Through External Authentication settings
D.
Through External Authentication settings
Answers
Suggested answer: A

Explanation:

You can invoke an integration policy on FortiSIEM rules by configuring the Notification Policy settings. You can select an integration policy from the drop-down list and specify the conditions for triggering it. For example, you can invoke an integration policy when an incident is created, updated, or closed.

Reference:Fortinet NSE 7 - Advanced Analytics 6.3 Exam Description, page 9

Refer to the exhibit.

How long has the UEBA agent been operationally down?

A.
21 Hours
A.
21 Hours
Answers
B.
9 Hours
B.
9 Hours
Answers
C.
20 Hours
C.
20 Hours
Answers
D.
2 Hours
D.
2 Hours
Answers
Suggested answer: A

Explanation:

The UEBA agent status shows that it has been operationally down for one day and three hours ago (1d3h). This means that it has been down for 24 hours plus three hours, which is equal to 21 hours.

Refer to the exhibit. Click on the calculator button.

The profile database contains CPU utilization values from day one. At midnight on the second day, the CPU utilization values from the daily database will be merged with the profile database.

In the profile database, in the Hour of Day column where 9 is the value, what will be the updated minimum, maximum, and average CPU utilization values?

A.
Min CPU Util=32.31, Max CPU Ucil=33.50 and AVG CPU Util=33.50
A.
Min CPU Util=32.31, Max CPU Ucil=33.50 and AVG CPU Util=33.50
Answers
B.
Min CPU Util=32.31, Max CPU Ucil=33.50 and AVG CPU Util=32.67
B.
Min CPU Util=32.31, Max CPU Ucil=33.50 and AVG CPU Util=32.67
Answers
C.
Min CPU Util=32.31, Max CPU Ucil=32.31 and AVG CPU Util=32.31
C.
Min CPU Util=32.31, Max CPU Ucil=32.31 and AVG CPU Util=32.31
Answers
D.
Min CPU Util=33.50, Max CPU Ucil=33.50 and AVG CPU Util=33.50
D.
Min CPU Util=33.50, Max CPU Ucil=33.50 and AVG CPU Util=33.50
Answers
Suggested answer: B

Explanation:

The profile database contains CPU utilization values from day one. At midnight on the second day, the CPU utilization values from the daily database will be merged with the profile database using a weighted average formula:

New value = (Old value x Old weight) + (New value x New weight) / (Old weight + New weight)

The weight is determined by the number of days in each database. In this case, the profile database has one day of data and the daily database has one day of data, so the weight is equal for both databases. Therefore, the formula simplifies to:

New value = (Old value + New value) / 2

In the profile database, in the Hour of Day column where 9 is the value, the updated minimum, maximum, and average CPU utilization values are:

Min CPU Util = (32.31 + 32.31) / 2 = 32.31 Max CPU Util = (33.50 + 33.50) / 2 = 33.50 AVG CPU Util = (32.67 + 32.67) / 2 = 32.67

Refer to the exhibit.

An administrator deploys a new collector for the first time, and notices that all the processes except the phMonitor are down.

How can the administrator bring the processes up?

A.
The administrator needs to run the command phtools --start all on the collector.
A.
The administrator needs to run the command phtools --start all on the collector.
Answers
B.
Rebooting the collector will bring up the processes.
B.
Rebooting the collector will bring up the processes.
Answers
C.
The processes will come up after the collector is registered to the supervisor.
C.
The processes will come up after the collector is registered to the supervisor.
Answers
D.
The collector was not deployed properly and must be redeployed.
D.
The collector was not deployed properly and must be redeployed.
Answers
Suggested answer: C

Explanation:

The collector processes are dependent on the registration with the supervisor. The phMonitor process is responsible for registering the collector to the supervisor and monitoring the health of other processes. After the registration is successful, the phMonitor will start the other processes on the collector.

How do customers connect to a shared multi-tenant instance on FortiSOAR?

A.
The MSSP must provide secure network connectivity between the FortiSOAR manager node and the customer devices.
A.
The MSSP must provide secure network connectivity between the FortiSOAR manager node and the customer devices.
Answers
B.
The MSSP must install a Secure Message Exchange node to connect to the customer's shared multi-tenant instance.
B.
The MSSP must install a Secure Message Exchange node to connect to the customer's shared multi-tenant instance.
Answers
C.
The customer must install a tenant node to connect to the MSSP shared multi-tenant instance.
C.
The customer must install a tenant node to connect to the MSSP shared multi-tenant instance.
Answers
D.
The MSSP must install an agent node on the customer's network to connect to the customer's shared multi-tenant instance.
D.
The MSSP must install an agent node on the customer's network to connect to the customer's shared multi-tenant instance.
Answers
Suggested answer: D

Explanation:

To connect to a shared multi-tenant instance on FortiSOAR, the MSSP must install an agent node on the customer's network. The agent node acts as a proxy between the customer's devices and the FortiSOAR manager node. The agent node also performs data collection, enrichment, and normalization for the customer's data sources.

Reference:Fortinet NSE 7 - Advanced Analytics 6.3 Exam Description, page 11

Total 34 questions
Go to page: of 4