ExamGecko
Home Home / Fortinet / NSE7_ADA-6.3

Fortinet NSE7_ADA-6.3 Practice Test - Questions Answers, Page 2

Question list
Search
Search

In the event of a WAN link failure between the collector and the supervisor, by default, what is the maximum number of event files stored on the collector?

A.
30.000
A.
30.000
Answers
B.
10.000
B.
10.000
Answers
C.
40.000
C.
40.000
Answers
D.
20.000
D.
20.000
Answers
Suggested answer: B

Explanation:

By default, the maximum number of event files stored on the collector in the event of a WAN link failure between the collector and the supervisor is 10.000. This value can be changed in the collector.properties file by modifying the parameter max_event_files_to_store.

Reference:Fortinet NSE 7 - Advanced Analytics 6.3 Exam Description, page 13

What is the disadvantage of automatic remediation?

A.
It can make a disruptive change to a user, block access to an application, or disconnect critical systems from the network.
A.
It can make a disruptive change to a user, block access to an application, or disconnect critical systems from the network.
Answers
B.
It is equivalent to running an IPS in monitor-only mode --- watches but does not block.
B.
It is equivalent to running an IPS in monitor-only mode --- watches but does not block.
Answers
C.
External threats or attacks detected by FortiSIEM will need user interaction to take action on an already overworked SOC team.
C.
External threats or attacks detected by FortiSIEM will need user interaction to take action on an already overworked SOC team.
Answers
D.
Threat behaviors occurring during the night could take hours to respond to.
D.
Threat behaviors occurring during the night could take hours to respond to.
Answers
Suggested answer: A

Explanation:

The disadvantage of automatic remediation is that it can make a disruptive change to a user, block access to an application, or disconnect critical systems from the network. Automatic remediation can have unintended consequences if not carefully planned and tested. Therefore, it is recommended to use manual or semi-automatic remediation for sensitive or critical systems.

Reference:Fortinet NSE 7 - Advanced Analytics 6.3 Exam Description, page 15

What are the modes of Data Ingestion on FortiSOAR? (Choose three.)

A.
Rule based
A.
Rule based
Answers
B.
Notification based
B.
Notification based
Answers
C.
App Push
C.
App Push
Answers
D.
Policy based
D.
Policy based
Answers
E.
Schedule based
E.
Schedule based
Answers
Suggested answer: B, C, E

Explanation:

The modes of Data Ingestion on FortiSOAR are notification based, app push, and schedule based. Notification based mode allows FortiSOAR to receive data from external sources via webhooks or email notifications. App push mode allows FortiSOAR to receive data from external sources via API calls or scripts. Schedule based mode allows FortiSOAR to pull data from external sources at regular intervals using connectors.

Reference:Fortinet NSE 7 - Advanced Analytics 6.3 Exam Description, page 17

How can you empower SOC by deploying FortiSOAR? (Choose three.)

A.
Aggregate logs from distributed systems
A.
Aggregate logs from distributed systems
Answers
B.
Collaborative knowledge sharing
B.
Collaborative knowledge sharing
Answers
C.
Baseline user and traffic behavior
C.
Baseline user and traffic behavior
Answers
D.
Reduce human error
D.
Reduce human error
Answers
E.
Address analyst skills gap
E.
Address analyst skills gap
Answers
Suggested answer: B, D, E

Explanation:

You can empower SOC by deploying FortiSOAR in the following ways:

Collaborative knowledge sharing: FortiSOAR allows you to create and share playbooks, workflows, tasks, and notes among SOC analysts and teams. This enables faster and more consistent incident response and reduces duplication of efforts.

Reduce human error: FortiSOAR automates repetitive and tedious tasks, such as data collection, enrichment, analysis, and remediation. This reduces the risk of human error and improves efficiency and accuracy.

Address analyst skills gap: FortiSOAR provides a graphical user interface for creating and executing playbooks and workflows without requiring coding skills. This lowers the barrier for entry-level analysts and helps them learn from best practices and expert knowledge.

Reference:Fortinet NSE 7 - Advanced Analytics 6.3 Exam Description, page 19

Which of the following are two Tactics in the MITRE ATT&CK framework? (Choose two.)

A.
Root kit
A.
Root kit
Answers
B.
Reconnaissance
B.
Reconnaissance
Answers
C.
Discovery
C.
Discovery
Answers
D.
BITS Jobs
D.
BITS Jobs
Answers
E.
Phishing
E.
Phishing
Answers
Suggested answer: B, C

Explanation:

Reconnaissance and Discovery are two Tactics in the MITRE ATT&CK framework. Tactics are the high-level objectives of an adversary, such as initial access, persistence, lateral movement, etc. Reconnaissance is the tactic of gathering information about a target before launching an attack. Discovery is the tactic of exploring a compromised system or network to find information or assets of interest.

Reference:Fortinet NSE 7 - Advanced Analytics 6.3 Exam Description, page 21

Refer to the exhibit. Click on the calculator button.

Based on the information provided in the exhibit, calculate the unused events for the next three minutes for a 520 EPS license.

A.
72460
A.
72460
Answers
B.
73460
B.
73460
Answers
C.
74460
C.
74460
Answers
D.
71460
D.
71460
Answers
Suggested answer: B

Explanation:

The unused events for the next three minutes for a 520 EPS license can be calculated by multiplying the licensed EPS by the time interval and subtracting the total number of events received in that interval. In this case, the calculation is:

520 x 180 - 27000 = 73460

Refer to the exhibit.

An administrator wants to remediate the incident from FortiSIEM shown in the exhibit.

What option is available to the administrator?

A.
Quarantine IP FortiClient
A.
Quarantine IP FortiClient
Answers
B.
Run the block MAC FortiOS.
B.
Run the block MAC FortiOS.
Answers
C.
Run the block IP FortiOS 5.4
C.
Run the block IP FortiOS 5.4
Answers
D.
Run the block domain Windows DNS
D.
Run the block domain Windows DNS
Answers
Suggested answer: C

Explanation:

The incident from FortiSIEM shown in the exhibit is a brute force attack on a FortiGate device. The remediation option available to the administrator is to run the block IP FortiOS 5.4 action, which will block the source IP address of the attacker on the FortiGate device using a firewall policy.

What happens to UEBA events when a user is off-net?

A.
The agent will upload the events to the Worker if it cannot upload them to a FortiSIEM collector
A.
The agent will upload the events to the Worker if it cannot upload them to a FortiSIEM collector
Answers
B.
The agent will cache events locally if it cannot upload them to a FortiSIEM collector
B.
The agent will cache events locally if it cannot upload them to a FortiSIEM collector
Answers
C.
The agent will upload the events to the Supervisor if it cannot upload them to a FortiSIEM collector
C.
The agent will upload the events to the Supervisor if it cannot upload them to a FortiSIEM collector
Answers
D.
The agent will drop the events if it cannot upload them to a FortiSIEM collector
D.
The agent will drop the events if it cannot upload them to a FortiSIEM collector
Answers
Suggested answer: B

Explanation:

When a user is off-net, meaning they are not connected to a network where a FortiSIEM collector is reachable, then UEBA events will be cached locally by the agent if it cannot upload them to a FortiSIEM collector. The agent will store up to 100 MB of events in a local database file and try to upload them when it detects a network change or every five minutes.

Refer to the exhibit.

An administrator runs an analytic search for all FortiGate SSL VPN logon failures. The results are grouped by source IP, reporting IP, and user. The administrator wants to restrict the results to only those rows where the COUNT >= 3.

Which user would meet that condition?

A.
Sarah
A.
Sarah
Answers
B.
Jan
B.
Jan
Answers
C.
Tom
C.
Tom
Answers
D.
Admin
D.
Admin
Answers
Suggested answer: C

Explanation:

The user who would meet that condition is Tom. Tom has four rows in the results where the COUNT is greater than or equal to three, meaning he had at least three SSL VPN logon failures from the same source IP and reporting IP. The other users have either less than three rows or less than three COUNT in each row.

Refer to the exhibit.

Is the Windows agent delivering event logs correctly?

A.
The logs are buffered by the agent and will be sent once the status changes to managed.
A.
The logs are buffered by the agent and will be sent once the status changes to managed.
Answers
B.
The agent is registered and it is sending logs correctly.
B.
The agent is registered and it is sending logs correctly.
Answers
C.
The agent is not sending logs because it did not receive a monitoring template.
C.
The agent is not sending logs because it did not receive a monitoring template.
Answers
D.
Because the agent is unmanaged. the logs are dropped silently by the supervisor.
D.
Because the agent is unmanaged. the logs are dropped silently by the supervisor.
Answers
Suggested answer: D

Explanation:

The windows agent is not delivering event logs correctly because the agent is unmanaged, meaning it is not assigned to any organization or customer. The supervisor will drop the logs silently from unmanaged agents, as they are not associated with any valid license or CMDB.

Total 34 questions
Go to page: of 4