Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Fortinet NSE 6 Network Security Specialist NSE6_FSR-7.3 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What are two use cases for configuring a FortiSOAR HA cluster?

(Choose two.)

Options:

A.

Disaster recovery


B.

Multi-tenancy


C.

Data externalization


D.

Scaling


Expert Solution
Questions # 2:

Which service on FortiSOAR is the playbook scheduler?

Options:

A.

cyops-torccat


B.

colcrybeatd


C.

celeryd


D.

uwsgi


Expert Solution
Questions # 3:

An administrator is issuing the following command on a node trying to join a FortiSOAR duster as a standby: csadm ha join-cluster --status active —role secondary --primary-node 10.0.1.160

The node fails to join the cluster. What is the issue?

Options:

A.

The role value should be worker.


B.

The primary node needs to be resolvable via FQDN.


C.

The IP address should be for secondary-node Instead of primary-node.


D.

The status value should be passive.


Expert Solution
Questions # 4:

Which two ports must be open between FortiSOAR HA nodes'* (Choose two.)

Options:

A.

Port 5432


B.

Port 25


C.

Port 6380


D.

Port 9200


Expert Solution
Questions # 5:

Refer to the exhibit.

Question # 5

When importing modules to FortiSOAR using the configuration wizard, what actions are applied to fields it you select Merge with Existing as the Bulk action?

Options:

A.

Existing fields are kept, new fields are added, and non-imported fields are deleted.


B.

Existing Holds are overwritten, now fields are added, and non-imported fields are deleted.


C.

Existing fields are kept, new fields are added, and non-imported fields are kept.


D.

Existing fields are overwritten, new fields are added, and non-Imported fields are kept.


Expert Solution
Questions # 6:

Which log file contains license synchronization logs on FortiSOAR?

Options:

A.

fdn.log


B.

beat.log


C.

celery.log


D.

falcon.log


Expert Solution
Questions # 7:

Which SMS vendor does FortiSOAR support for two-factor authentication?

Options:

A.

Twilio


B.

Google Authenticator


C.

2factor


D.

Telesign


Expert Solution
Questions # 8:

Which two relationship types are configurable on FortiSOAR?

(Choose two.)

Options:

A.

Siblings


B.

Grandparents


C.

Parents


D.

Relatives


Expert Solution
Questions # 9:

What two permissions must you assign to a user to allow the purge of audit logs for all users? (Choose two answers)

Options:

A.

Delete permission on the Security module


B.

Delete permission on the Audit Log Activities module


C.

Delete permission on the People module


D.

Delete permission on the Users module


Expert Solution
Questions # 10:

A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)

Options:

A.

Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.


B.

View the user's effective role permissions, and then investigate which role is providing that access.


C.

Remove all record ownership that is assigned to the user.


D.

Review the user's learn hierarchy to ensure that the appropriate relationships are configured.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions