ExamGecko
Home Home / Fortinet / NSE7_ADA-6.3

Fortinet NSE7_ADA-6.3 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Refer to the exhibit.

Why was this incident auto cleared?

A.
Within five minutes the packet loss percentage dropped to a level where the reporting IP is the same as the host IP
A.
Within five minutes the packet loss percentage dropped to a level where the reporting IP is the same as the host IP
Answers
B.
The original rule did not trigger within five minutes
B.
The original rule did not trigger within five minutes
Answers
C.
Within five minutes, the packet loss percentage dropped to a level where the reporting IP is same as the source IP
C.
Within five minutes, the packet loss percentage dropped to a level where the reporting IP is same as the source IP
Answers
D.
Within five minutes, the packet loss percentage dropped to a level where the host IP of the original rule matches the host IP of the clear condition pattern
D.
Within five minutes, the packet loss percentage dropped to a level where the host IP of the original rule matches the host IP of the clear condition pattern
Answers
Suggested answer: D

Explanation:

The incident was auto cleared because within five minutes, the packet loss percentage dropped to a level where the host IP of the original rule matches the host IP of the clear condition pattern. The clear condition pattern specifies that if there is an event with a packet loss percentage less than or equal to 10% and a host IP that matches any host IP in this incident, then clear this incident.

From where does the rule engine load the baseline data values?

A.
The profile report
A.
The profile report
Answers
B.
The daily database
B.
The daily database
Answers
C.
The profile database
C.
The profile database
Answers
D.
The memory
D.
The memory
Answers
Suggested answer: C

Explanation:

The rule engine loads the baseline data values from the profile database. The profile database contains historical data that is used for baselining calculations, such as minimum, maximum, average, standard deviation, and percentile values for various metrics.

Refer to the exhibit.

Which statement about the rule filters events shown in the exhibit is true?

A.
The rule filters events with an event type that belong to the Domain Account Locked CMDB group or a reporting IP that belong to the Domain Controller applications group.
A.
The rule filters events with an event type that belong to the Domain Account Locked CMDB group or a reporting IP that belong to the Domain Controller applications group.
Answers
B.
The rule filters events with an event type that belong to the Domain Account Locked CMDB group and a reporting |P that belong to the Domain Controller applications group.
B.
The rule filters events with an event type that belong to the Domain Account Locked CMDB group and a reporting |P that belong to the Domain Controller applications group.
Answers
C.
The rule filters events with an event type that belong to the Domain Account Locked CMDB group and a user that belongs to the Domain Controller applications group.
C.
The rule filters events with an event type that belong to the Domain Account Locked CMDB group and a user that belongs to the Domain Controller applications group.
Answers
D.
The rule filters events with an event type that equals Domain Account Locked and a reporting IP that equals Domain Controller applications.
D.
The rule filters events with an event type that equals Domain Account Locked and a reporting IP that equals Domain Controller applications.
Answers
Suggested answer: B

Explanation:

The rule filters events with an event type that belong to the Domain Account Locked CMDB group and a reporting IP that belong to the Domain Controller applications group. This means that only events that have both criteria met will be processed by this rule. The event type and reporting IP are joined by an AND operator, which requires both conditions to be true.

Refer to the exhibit.

Why is the windows device still in the CMDB, even though the administrator uninstalled the windows agent?

A.
The device was not uninstalled properly
A.
The device was not uninstalled properly
Answers
B.
The device must be deleted from backend of FortiSIEM
B.
The device must be deleted from backend of FortiSIEM
Answers
C.
The device has performance jobs assigned
C.
The device has performance jobs assigned
Answers
D.
The device must be deleted manually from the CMDB
D.
The device must be deleted manually from the CMDB
Answers
Suggested answer: D

Explanation:

The windows device is still in the CMDB, even though the administrator uninstalled the windows agent, because the device must be deleted manually from the CMDB. Uninstalling the windows agent does not automatically remove the device from the CMDB, as there may be other sources of data for the device, such as SNMP or syslog. To delete the device from the CMDB, the administrator must go to CMDB > Devices > All Devices, select the device, and click Delete.

Total 34 questions
Go to page: of 4