ExamGecko
Home Home / Fortinet / NSE7_ADA-6.3

Fortinet NSE7_ADA-6.3 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Refer to the exhibit.

The exhibit shows the output of an SQL command that an administrator ran to view the natural_id value, after logging into the Postgres database.

What does the natural_id value identify?

A.
The supervisor
A.
The supervisor
Answers
B.
The worker
B.
The worker
Answers
C.
An agent
C.
An agent
Answers
D.
The collector
D.
The collector
Answers
Suggested answer: D

Explanation:

The natural_id value identifies the collector in the FortiSIEM system. The natural_id is a unique identifier that is assigned to each collector during the registration process with the supervisor. The natural_id is used to associate events and performance data with the collector that collected them.


Refer to the exhibit.

The window for this rule is 30 minutes.

What is this rule tracking?

A.
A sudden 50% increase in WMI response times over a 30-minute time window
A.
A sudden 50% increase in WMI response times over a 30-minute time window
Answers
B.
A sudden 1.50 times increase in WMI response times over a 30-minute time window
B.
A sudden 1.50 times increase in WMI response times over a 30-minute time window
Answers
C.
A sudden 75% increase in WMI response times over a 30-minute time window
C.
A sudden 75% increase in WMI response times over a 30-minute time window
Answers
D.
A sudden 150% increase in WMI response times over a 30-minute time window
D.
A sudden 150% increase in WMI response times over a 30-minute time window
Answers
Suggested answer: B

Explanation:

The rule is tracking the WMI response times from Windows devices using a baseline calculation. The rule will trigger an incident if the current WMI response time is greater than or equal to 1.50 times the average WMI response time in the last 30 minutes.

Which three processes are collector processes? (Choose three.)

A.
phAgentManaqer
A.
phAgentManaqer
Answers
B.
phParser
B.
phParser
Answers
C.
phRuleMaster
C.
phRuleMaster
Answers
D.
phReportM aster
D.
phReportM aster
Answers
E.
phMonitorAgent
E.
phMonitorAgent
Answers
Suggested answer: B, C, E

Explanation:

The collector processes are responsible for receiving, parsing, normalizing, correlating, and monitoring events from various sources. The collector processes are phParser, phRuleMaster, and phMonitorAgent.

Which statement about EPS bursting is true?

A.
FortiSIEM will let you burst up to five times the licensed EPS once during a 24-hour period.
A.
FortiSIEM will let you burst up to five times the licensed EPS once during a 24-hour period.
Answers
B.
FortiSIEM must be provisioned with ten percent the licensed EPS to handle potential event surges.
B.
FortiSIEM must be provisioned with ten percent the licensed EPS to handle potential event surges.
Answers
C.
FortiSIEM will let you burst up to five times the licensed EPS at any given time, provided it has accumulated enough unused EPS.
C.
FortiSIEM will let you burst up to five times the licensed EPS at any given time, provided it has accumulated enough unused EPS.
Answers
D.
FortiSIEM will let you burst up to five times the licensed EPS at any given time, regardless of unused of EPS.
D.
FortiSIEM will let you burst up to five times the licensed EPS at any given time, regardless of unused of EPS.
Answers
Suggested answer: C

Explanation:

FortiSIEM allows EPS bursting to handle event spikes without dropping events or violating the license agreement. EPS bursting means that FortiSIEM will let you burst up to five times the licensed EPS at any given time, provided it has accumulated enough unused EPS from previous time intervals.

On which disk are the SQLite databases that are used for the baselining stored?

A.
Disk1
A.
Disk1
Answers
B.
Disk4
B.
Disk4
Answers
C.
Disk2
C.
Disk2
Answers
D.
Disk3
D.
Disk3
Answers
Suggested answer: D

Explanation:

The SQLite databases that are used for the baselining are stored on Disk3 of the FortiSIEM server. Disk3 is also used for storing raw event data and CMDB data.

Refer to the exhibit.

The rule evaluates multiple VPN logon failures within a ten-minute window. Consider the following VPN failure events received within a ten-minute window:

How many incidents are generated?

A.
1
A.
1
Answers
B.
2
B.
2
Answers
C.
0
C.
0
Answers
D.
3
D.
3
Answers
Suggested answer: B

Explanation:

The rule evaluates multiple VPN logon failures within a ten-minute window. The rule will generate an incident if there are more than three VPN logon failures from the same source IP address within a ten-minute window. Based on the VPN failure events received within a ten-minute window, there are two incidents generated:

One incident for source IP address 10.10.10.10, which has four VPN logon failures at 09:01, 09:02, 09:03, and 09:04.

One incident for source IP address 10.10.10.11, which has four VPN logon failures at 09:06, 09:07, 09:08, and 09:09.

Which two statements about the maximum device limit on FortiSIEM are true? (Choose two.)

A.
The device limit is defined per customer and every customer is assigned a fixed number of device limit by the service provider.
A.
The device limit is defined per customer and every customer is assigned a fixed number of device limit by the service provider.
Answers
B.
The device limit is only applicable to enterprise edition.
B.
The device limit is only applicable to enterprise edition.
Answers
C.
The device limit is based on the license type that was purchased from Fortinet.
C.
The device limit is based on the license type that was purchased from Fortinet.
Answers
D.
The device limit is defined for the whole system and is shared by every customer on a service provider edition.
D.
The device limit is defined for the whole system and is shared by every customer on a service provider edition.
Answers
Suggested answer: B, C

Explanation:

The device limit is a feature of the enterprise edition of FortiSIEM that restricts the number of devices that can be added to the system based on the license type. The device limit does not apply to the service provider edition, which allows unlimited devices per customer. The device limit is determined by the license type that was purchased from Fortinet, such as 100 devices, 500 devices, or unlimited devices.

Identify the processes associated with Machine Learning/Al on FortiSIEM. (Choose two.)

A.
phFortiInsightAI
A.
phFortiInsightAI
Answers
B.
phReportMaster
B.
phReportMaster
Answers
C.
phRuleMaster
C.
phRuleMaster
Answers
D.
phAnomaly
D.
phAnomaly
Answers
E.
phRuleWorker
E.
phRuleWorker
Answers
Suggested answer: A, D

Explanation:

The processes associated with Machine Learning/AI on FortiSIEM are phFortiInsightAI and phAnomaly. phFortiInsightAI is responsible for detecting anomalous user behavior using UEBA (User and Entity Behavior Analytics) techniques. phAnomaly is responsible for detecting anomalous network behavior using NTA (Network Traffic Analysis) techniques.

Which three statements about phRuleMaster are true? (Choose three.)

A.
phRuleMaster queues up the data being received from the phRuleWorkers into buckets.
A.
phRuleMaster queues up the data being received from the phRuleWorkers into buckets.
Answers
B.
phRuleMaster is present on the supervisor and workers.
B.
phRuleMaster is present on the supervisor and workers.
Answers
C.
phRuleMaster is present on the supervisor only
C.
phRuleMaster is present on the supervisor only
Answers
D.
phRuleMaster wakes up to evaluate all the rule data in series, every 30 seconds.
D.
phRuleMaster wakes up to evaluate all the rule data in series, every 30 seconds.
Answers
E.
phRuleMaster wakes up to evaluate all the rule data in parallel, even/ 30 seconds
E.
phRuleMaster wakes up to evaluate all the rule data in parallel, even/ 30 seconds
Answers
Suggested answer: A, B, E

Explanation:

phRuleMaster is a process that performs rule evaluation and incident generation on FortiSIEM. phRuleMaster queues up the data being received from the phRuleWorkers into buckets based on time intervals, such as one minute, five minutes, or ten minutes. phRuleMaster is present on both the supervisor and workers nodes of a FortiSIEM cluster. phRuleMaster wakes up every 30 seconds to evaluate all the rule data in parallel using multiple threads.

Refer to the exhibit.

The service provider deployed FortiSIEM without a collector and added three customers on the supervisor.

What mistake did the administrator make?

A.
Customer A and customer B have overlapping IP addresses.
A.
Customer A and customer B have overlapping IP addresses.
Answers
B.
Collectors must be deployed on all customer premises before they are added to organizations on the supervisor.
B.
Collectors must be deployed on all customer premises before they are added to organizations on the supervisor.
Answers
C.
The number of workers on the FortiSIEM cluster must match the number of customers added.
C.
The number of workers on the FortiSIEM cluster must match the number of customers added.
Answers
D.
At least one collector must be deployed to collect logs from service provider infrastructure devices.
D.
At least one collector must be deployed to collect logs from service provider infrastructure devices.
Answers
Suggested answer: A

Explanation:

The mistake that the administrator made is that customer A and customer B have overlapping IP addresses. This will cause confusion and errors in event collection and correlation, as well as CMDB discovery and classification. To avoid this problem, each customer should have a unique IP address range or use NAT to translate their IP addresses.

Total 34 questions
Go to page: of 4