Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NSE5_FAZ-7.2 Exam Dumps - Fortinet NSE 5 - FortiAnalyzer 7.2 Analyst

Question # 4

In the FortiAnalyzer FortiView, source and destination IP addresses from FortiGate devices arenotresolving to a hostname.

How can you resolve the source and destination IP addresses, without introducing any additional performance impact to FortiAnalyzer?

A.

Resolve IP addresses on a per-ADOM basis to reduce delay on FortiView while IPs resolve

B.

Configure# set resolve-ip enablein the system FortiView settings

C.

Configure local DNS servers on FortiAnalyzer

D.

Resolve IP addresses on FortiGate

Full Access
Question # 5

What happens when a log file saved on FortiAnalyzer disks reaches the size specified in the device log

settings?

A.

The log file is stored as a raw log and is available for analytic support.

B.

The log file rolls over and is archived.

C.

The log file is purged from the database.

D.

The log file is overwritten.

Full Access
Question # 6

Refer to the exhibit.

The exhibit shows “remoteservergroup” is an authentication server group with LDAP and RADIUS servers.

Which two statements express the significance of enabling “Match all users on remote server” when configuring a new administrator? (Choose two.)

A.

It creates a wildcard administrator using LDAP and RADIUS servers.

B.

Administrator can log in to FortiAnalyzer using their credentials on remote servers LDAP and RADIUS.

C.

Use remoteadmin from LDAP and RADIUS servers will be able to log in to FortiAnalyzer at anytime.

D.

It allows administrators to use two-factor authentication.

Full Access
Question # 7

What is the purpose of a dataset query in FortiAnalyzer?

A.

It sorts log data into tables

B.

It extracts the database schema

C.

It retrieves log data from the database

D.

It injects log data into the database

Full Access
Question # 8

Refer to the exhibits.

How many events will be added to the incident created after running this playbook?

A.

Ten events will be added.

B.

No events will be added.

C.

Five events will be added.

D.

Thirteen events will be added.

Full Access
Question # 9

Which statement correctly describes the management extensions available on FortiAnalyzer?

A.

Management extensions do not require additional licenses.

B.

Management extensions allow FortiAnalyzer to act as a ForbSIEM supervisor.

C.

Management extensions require a dedicated VM for best performance.

D.

Management extensions may require a minimum number of CPU cores to run.

Full Access
Question # 10

Logs are being deleted from one of the ADOMs earlier than the configured setting for archiving in the data

policy.

What is the most likely problem?

A.

CPU resources are too high

B.

Logs in that ADOM are being forwarded, in real-time, to another FortiAnalyzer device

C.

The total disk space is insufficient and you need to add other disk

D.

The ADOM disk quota is set too low, based on log rates

Full Access
Question # 11

Which two actions should an administrator take to view Compromised Hosts on FortiAnalyzer? (Choose two.)

A.

Enable web filtering in firewall policies on FortiGate devices, and make sure these logs are sent to FortiAnalyzer.

B.

Make sure all endpoints are reachable by FortiAnalyzer.

C.

Enable device detection on an interface on the FortiGate devices that are connected to the FortiAnalyzer device.

D.

Subscribe FortiAnalyzer to FortiGuard to keep its local threat database up to date.

Full Access
Question # 12

Refer to the exhibit.

Which statement is correct regarding the event displayed?

A.

The security risk was blocked or dropped.

B.

The security event risk is considered open.

C.

An incident was created from this event.

D.

The risk source is isolated.

Full Access
Question # 13

Which statement about sending notifications with incident updates is true?

A.

Notifications can be sent only when an incident is created or deleted.

B.

You must configure an output profile to send notifications by email.

C.

Each incident can send notifications to a single external platform.

D.

Each connector used can have different notification settings.

Full Access
Question # 14

What remote authentication servers can you configure to validate your FortiAnalyzer administrator logons? (Choose three)

A.

RADIUS

B.

Local

C.

LDAP

D.

PKI

E.

TACACS+

Full Access
Question # 15

Which item must you configure on FortiAnalyzer to email generated reports automatically?

A.

Output profile

B.

Report scheduling

C.

SFTP server

D.

SNMP server

Full Access
Question # 16

After you have moved a registered logging device out of one ADOM and into a new ADOM, what is the

purpose of running the following CLI command?

execute sql-local rebuild-adom

A.

To reset the disk quota enforcement to default

B.

To remove the analytics logs of the device from the old database

C.

To migrate the archive logs to the new ADOM

D.

To populate the new ADOM with analytical logs for the moved device, so you can run reports

Full Access
Question # 17

The admin administrator is failing to register a FortiClient EMS on the FortiAnalyzer device.

What can be the reason for this failure?

A.

FortiAnalyzer is in an HA cluster.

B.

ADOM mode should be set to advanced, in order to register the FortiClient EMS device.

C.

ADOMs are not enabled on FortiAnalyzer.

D.

A separate license is required on FortiAnalyzer in order to register the FortiClient EMS device.

Full Access
Question # 18

What is the purpose of output variables?

A.

To store playbook execution statistics

B.

To use the output of the previous task as the input of the current task

C.

To display details of the connectors used by a playbook

D.

To save all the task settings when a playbook is exported

Full Access
Question # 19

What happens when the IOC breach detection engine on FortiAnalyzer finds web logs that match a blocklisted IP address?

A.

The endpoint is marked as Compromised and. optionally, can be put in quarantine.

B.

FortiAnalyzer flags the associated host for further analysis.

C.

A new Infected entry is added for the corresponding endpoint.

D.

The detection engine classifies those logs as Suspicious

Full Access
Question # 20

Logs are being deleted from one of your ADOMs earlier that the configured setting for archiving in your data policy. What is the most likely problem?

A.

The total disk space is insufficient and you need to add other disk.

B.

CPU resources are too high.

C.

The ADOM disk quota is set too low based on log rates.

D.

Logs in that ADOM are being forwarded in real-time to another FortiAnalyzer device.

Full Access
Question # 21

What FortiGate process caches logs when FortiAnalyzer is not reachable?

A.

logfiled

B.

sqlplugind

C.

oftpd

D.

miglogd

Full Access
Question # 22

What is the purpose of trigger variables?

A.

To display statistics about the playbook runtime

B.

To use information from the trigger to filter the action in a task

C.

To provide the trigger information to make the playbook start running

D.

To store the start times of playbooks with On_Schedule triggers

Full Access
Question # 23

Which statement describes a dataset in FortiAnalyzer?

A.

They determine what data is retrieved from the database.

B.

They provide the layout used for reports.

C.

They are used to set the data included in templates.

D.

They define the chart types to be used in reports.

Full Access
Question # 24

If the primary FortiAnalyzer in an HA cluster fails, how is the new primary elected?

A.

The configured IP address is checked first.

B.

The active port number is checked first.

C.

The firmware version is checked first.

D.

The configured priority is checked first

Full Access
Question # 25

Which statement about the FortiSIEM management extension is correct?

A.

Allows you to manage the entire life cycle of a threat or breach.

B.

Its use of the available disk space is capped at 50%.

C.

It requires a licensed FortiSIEM supervisor.

D.

It can be installed as a dedicated VM.

Full Access
Question # 26

Which two statements about log forwarding are true? (Choose two.)

A.

Forwarded logs cannot be filtered to match specific criteria.

B.

Logs are forwarded in real-time only.

C.

The client retains a local copy of the logs after forwarding.

D.

You can use aggregation mode only with another FortiAnalyzer.

Full Access
Question # 27

Which two statements are true regarding high availability (HA) on FortiAnalyzer? (Choose two.)

A.

FortiAnalyzer HA can function without VRRP. and VRRP is required only if you have more than two FortiAnalyzer devices in a cluster.

B.

FortiAnalyzer HA supports synchronization of logs as well as some system and configuration settings.

C.

All devices in a FortiAnalyzer HA cluster must run in the same operation mode: analyzer or collector.

D.

FortiAnalyzer HA implementation is supported by many public cloud infrastructures such as AWS, Microsoft Azure, and Google Cloud.

Full Access
Question # 28

What is required to authorize a FortiGate on FortiAnalyzer using Fabric authorization?

A.

A FortiGate ADOM

B.

The FortiGate serial number

C.

A pre-shared key

D.

Valid FortiAnalyzer credentials

Full Access
Question # 29

What purposes does the auto-cache setting on reports serve? (Choose two.)

A.

To reduce report generation time

B.

To automatically update the hcache when new logs arrive

C.

To reduce the log insert lag rate

D.

To provide diagnostics on report generation time

Full Access
Question # 30

You’ve moved a registered logging device out of one ADOM and into a new ADOM. What happens when you rebuild the new ADOM database?

A.

FortiAnalyzer resets the disk quota of the new ADOM to default.

B.

FortiAnalyzer migrates archive logs to the new ADOM.

C.

FortiAnalyzer migrates analytics logs to the new ADOM.

D.

FortiAnalyzer removes logs from the old ADOM.

Full Access
Question # 31

A playbook contains five tasks in total. An administrator runs the playbook and four out of five tasks finish successfully, but one task fails. What will be the status of the playbook after it is run?

A.

Running

B.

Failed

C.

Upstream_failed

D.

Success

Full Access
Question # 32

View the exhibit.

What does the data point at 14:35 tell you?

A.

FortiAnalyzer is dropping logs.

B.

FortiAnalyzer is indexing logs faster than logs are being received.

C.

FortiAnalyzer has temporarily stopped receiving logs so older logs’ can be indexed.

D.

The sqlplugind daemon is ahead in indexing by one log.

Full Access
Question # 33

If you upgrade the FortiAnalyzer firmware, which report element can be affected?

A.

Custom datasets

B.

Report scheduling

C.

Report settings

D.

Output profiles

Full Access
Question # 34

Which two statements are true regarding fabric connectors? (Choose two.)

A.

Configuring fabric connectors to send notification to ITSM platform upon incident creation Is more efficient than third-party information from the FortiAnalyzer API.

B.

Fabric connectors allow to save storage costs and improve redundancy.

C.

Storage connector service does not require a separate license to send logs to cloud platform.

D.

Cloud-Out connections allow you to send real-time logs to pubic cloud accounts like Amazon S3, Azure Blob , and Google Cloud.

Full Access
Question # 35

What is the recommended method of expanding disk space on a FortiAnalyzer VM?

A.

From the VM host manager, add an additional virtual disk and use the #execute lvm extend command to expand the storage

B.

From the VM host manager, expand the size of the existing virtual disk

C.

From the VM host manager, expand the size of the existing virtual disk and use the # execute format disk command to reformat the disk

D.

From the VM host manager, add an additional virtual disk and rebuild your RAID array

Full Access
Question # 36

After generating a report, you notice the information you were expecting to see is not included in it. What are two possible reasons for this scenario? (Choose two.)

A.

You enabled auto-cache with extended log filtering.

B.

The logfiled service has not indexed all the expected logs.

C.

The logs were overwritten by the data retention policy.

D.

The time frame selected in the report is wrong.

Full Access
Question # 37

Which statement describes online logs on FortiAnalyzer?

A.

Logs that reached a specific size and were rolled over

B.

Logs that can be used to create reports

C.

Logs that can be viewed using Log Browse

D.

Logs that are saved to disk, compressed, and available in FortiView

Full Access
Question # 38

What are two effects of enabling auto-cache in a FortiAnalyzer report? (Choose two.)

A.

The size of newly generated reports is optimized to conserve disk space.

B.

FortiAnalyzer local cache is used to store generated reports.

C.

When new logs are received, the hard-cache data is updated automatically.

D.

The generation time for reports is decreased.

Full Access
Question # 39

Which two statements are true regarding log fetching on FortiAnalyzer? (Choose two.)

A.

A FortiAnalyzer device can perform either the fetch server or client role, and it can perform two roles at the same time with the same FortiAnalyzer devices at the other end.

B.

Log fetching can be done only on two FortiAnalyzer devices that are running the same firmware version.

C.

Log fetching allows the administrator to fetch analytics logs from another FortiAnalyzer for redundancy.

D.

Log fetching allows the administrator to run queries and reports against historical data by retrieving archived logs from one FortiAnalyzer device and sending them to another FortiAnalyzer device.

Full Access
Question # 40

Which statements are true regarding securing communications between FortiAnalyzer and FortiGate with IPsec? (Choose two.)

A.

Must configure the FortiAnalyzer end of the tunnel only--the FortiGate end is auto-negotiated.

B.

Must establish an IPsec tunnel ID and pre-shared key.

C.

IPsec cannot be enabled if SSL is enabled as well.

D.

IPsec is only enabled through the CLI on FortiAnalyzer.

Full Access
Question # 41

When you perform a system backup, what does the backup configuration contain? (Choose two.)

A.

Generated reports

B.

Device list

C.

Authorized devices logs

D.

System information

Full Access