Special Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet FCSS_ADA_AR-6.7 FCSS Advanced Analytics 6.7 Architect Exam Practice Test

Page: 1 / 6
Total 59 questions

FCSS Advanced Analytics 6.7 Architect Questions and Answers

Question 1

Refer to the exhibit.

Question # 1

The service provider deployed FortiSIEM without a collector and added three customers on the supervisor.

What mistake did the administrator make?

Options:

A.

The number of workers on the FortiSIEM cluster must match the number of customers added

B.

Collectors must be deployed on all customer premises before they are added to organization on the supervisor.

C.

At least one collector must be deployed to collect logs from service provider infrastructure devices.

D.

Customer A and customer B have overlapping IP addresses.

Question 2

Refer to the exhibit.

Question # 2

Which scenario is not a supported nested query scenario?

Options:

A.

The outer query is the event query, and the inner query is the event query.

B.

The outer query is the event query, and the inner query is the CMDB query.

C.

The outer query is the CMDB query, and the inner query is the event query.

D.

The outer query is the CMDB query, and the inner query is the CMDB query.

Question 3

A service provider purchases a licensed EPS of 520. The guaranteed EPS allocated to three customers is 50, 100, and 150 respectively. At the end of every three-minute interval, incoming EPS is calculated at every collector and the value is sent to the central decision-making engine on the supervisor node.

The incoming EPS for the first collector is 25. the incoming EPS for the second collector is 50, and the incoming EPS for the third collector is 75.

Based on the information provided, what is the unused events total calculated by the supervisor?

Options:

A.

76.000

B.

35.960

C.

75.960

D.

71.460

Question 4

Which syntax will register a collector to the supervisor?

Options:

A.

phProvisionCollector -add

B.

phProvisionCollector -add

C.

phProvisionCollector -add

D.

phProvisionCollector -add

Question 5

Refer to the exhibit.

Question # 5

Which workers are assigned tasks for the query ID13127? (Choose two.)

Options:

A.

Worker1 has no tasks for query ID 13127*.

B.

Worker1 has one task for query ID 13127*.

C.

Worker2 has two tasks for query ID 13127*.

D.

Worker3 has four tasks for query ID 13127*.

E.

Worker3 has two tasks for query ID 13127*.

Question 6

Refer to the exhibit.

Question # 6

The rule evaluates multiple VPN logon failures within a ten-minute window. Consider the following VPN failure events received within a ten-minute window:

Question # 6

How many incidents are generated?

Options:

A.

1

B.

2

C.

0

D.

3

Question 7

Where are the SQLite databases that are used for the baselining, stored?

Options:

A.

/opt/phoenix/cache

B.

/opt/phoenix/bin

C.

/opt/phoenix/config

D.

/opt/phoenix/delta

Question 8

Which two statements about phRuleWorker are true? (Choose two.)

Options:

A.

phRuleWorker uses a 60-second bucket as an evaluation window.

B.

phRuleWorker evaluates non-aggregate conditions as defined in subpattern filters of a rule in memory.

C.

phRuleWorker exists on both the supervisor and workers.

D.

phRuleWorker exists on the worker only.

Question 9

Refer to the exhibit.

Question # 9

Consider a custom lookup tableMalwareIPList. An analyst constructed an analytic query to reference theMalwareIPListlookup table.

What is the outcome of the analytic query?

Options:

A.

The IP address from permitted traffic with a confidence score of 98 is displayed.

B.

The analyst receives an error because the LookupTableGet function can be used only in display filters to enrich data.

C.

The value for the LookupTableGet function in the analytic search can be either true or false.

D.

The permitted traffic IP address from the Phishing category is displayed.

Question 10

Refer to the exhibit.

Question # 10

Why is the windows device still in the CMDB, even though the administrator uninstalled the windows agent?

Options:

A.

The device mustbe deleted from backend of FortiSIEM

B.

The device has performance jobs assigned

C.

The device was not installed properly

D.

The device must be deleted manually from the CMDB

Question 11

How can you customize the AI model on FortiSIEM?

Options:

A.

Retrain the AI model

B.

Reconfigure UEBA rules

C.

Adjust risk weighting for UEBA tags

D.

Adjust number of samples collected by the UEBA agents

Question 12

What happens to events that the collector receives when there is a WAN link failure between the collector and the supervisor?

Options:

A.

Events are buffered for up to 24 hours.

B.

Events are buffered up to 10 MB before compression.

C.

Events are buffered up to 10.000 logs.

D.

Events are buffered up to 1 GB after compression.

Question 13

Which organization do agents belong to after registration? (Choose two.)

Options:

A.

The windows agents belong to the super organization.

B.

The agents belong to the organization specified in the agent installation setup wizard for Windows platforms.

C.

The Linux agents belong to the super local organization.

D.

The agents belong to the organization specified in the command line parameters for Linux platforms.

Question 14

What is the disadvantage of automatic remediation?

Options:

A.

It can make a disruptive change to a user, block access to an application, or disconnect critical systems from the network.

B.

External threats or attacks detected by FortiSIEM will need user interaction to take action on an already overworked SOC team.

C.

It is equivalent to running an IPS in monitor-only mode-watches but does not block.

D.

Threat behavior occurring during the night could take hours to respond to.

Question 15

Refer to the exhibit.

Question # 15

This is an example of a baseline profile that is configured in the backend of FortiSIEM.

Which two Group By attributes are configured for this profile? (Choose two.)

Options:

A.

Logon Failure

B.

Reporting Device

C.

Reporting IP

D.

Distinct User

Question 16

Refer to the exhibit.

Question # 16

Within what time window is the incident auto cleared?

Options:

A.

1800 seconds

B.

Null

C.

1 day

D.

30 minutes

Question 17

Why do collectors communicate with the Supervisor after registration? (Choose two.)

Options:

A.

To receive templates associated with agents

B.

To report the health status of the agents

C.

To upload event data if a worker down

D.

To report its own health status

Page: 1 / 6
Total 59 questions