New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Fortinet NSE 7 - Security Operations 7.6 Architect NSE7_SOC_AR-7.6 Question # 4 Topic 1 Discussion

Fortinet NSE 7 - Security Operations 7.6 Architect NSE7_SOC_AR-7.6 Question # 4 Topic 1 Discussion

NSE7_SOC_AR-7.6 Exam Topic 1 Question 4 Discussion:
Question #: 4
Topic #: 1

Refer to the exhibits.

You configured a spearphishing event handler and the associated rule. However. FortiAnalyzer did not generate an event.

When you check the FortiAnalyzer log viewer, you confirm that FortiSandbox forwarded the appropriate logs, as shown in the raw log exhibit.

What configuration must you change on FortiAnalyzer in order for FortiAnalyzer to generate an event?


A.

In the Log Type field, change the selection to AntiVirus Log(malware).


B.

Configure a FortiSandbox data selector and add it tothe event handler.


C.

In the Log Filter by Text field, type the value: .5 ub t ype ma Iwa re..


D.

Change trigger condition by selecting. Within a group, the log field Malware Kame (mname> has 2 or more unique values.


Get Premium NSE7_SOC_AR-7.6 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.