New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Fortinet Fortinet Certified Professional Security Operations NSE7_SOC_AR-7.6 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit.

You notice that the custom event handler you configured to detect SMTP reconnaissance activities is creating a large number of events. This is overwhelming your notification system.

How can you fix this?

Options:

A.

Increase the trigger count so that it identifies and reduces the count triggered by a particular group.


B.

Disable the custom event handler because it is not working as expected.


C.

Decrease the time range that the custom event handler covers during the attack.


D.

Increase the log field value so that it looks for more unique field values when it creates the event.


Expert Solution
Questions # 2:

Which two best practices should be followed when exporting playbooks in FortiAnalyzer? (Choose two answers)

Options:

A.

Disable playbooks before exporting them.


B.

Include the associated connector settings.


C.

Move playbooks between ADOMs rather than exporting playbooks and re-importing them.


D.

Ensure the exported playbook’s names do not exist in the target ADOM.


Expert Solution
Questions # 3:

When does FortiAnalyzer generate an event?

Options:

A.

When a log matches a filter in a data selector


B.

When a log matches an action in a connector


C.

When a log matches a rule in an event handler


D.

When a log matches a task in a playbook


Expert Solution
Questions # 4:

Refer to the exhibits.

You configured a spearphishing event handler and the associated rule. However. FortiAnalyzer did not generate an event.

When you check the FortiAnalyzer log viewer, you confirm that FortiSandbox forwarded the appropriate logs, as shown in the raw log exhibit.

What configuration must you change on FortiAnalyzer in order for FortiAnalyzer to generate an event?

Options:

A.

In the Log Type field, change the selection to AntiVirus Log(malware).


B.

Configure a FortiSandbox data selector and add it tothe event handler.


C.

In the Log Filter by Text field, type the value: .5 ub t ype ma Iwa re..


D.

Change trigger condition by selecting. Within a group, the log field Malware Kame (mname> has 2 or more unique values.


Expert Solution
Questions # 5:

Refer to Exhibit:

A SOC analyst is creating the Malicious File Detected playbook to run when FortiAnalyzer generates a malicious file event. The playbook must also update the incident with the malicious file event data.

What must the next task in this playbook be?

Options:

A.

A local connector with the action Update Asset and Identity


B.

A local connector with the action Attach Data to Incident


C.

A local connector with the action Run Report


D.

A local connector with the action Update Incident


Expert Solution
Questions # 6:

Refer to the exhibits.

What can you conclude from analyzing the data using the threat hunting module?

Options:

A.

Spearphishing is being used to elicit sensitive information.


B.

DNS tunneling is being used to extract confidential data from the local network.


C.

Reconnaissance is being used to gather victim identity information from the mail server.


D.

FTP is being used as command-and-control (C&C) technique to mine for data.


Expert Solution
Questions # 7:

Refer to the exhibits.

Question # 7

You have a playbook that, depending on whether an analyst deems the alert to be a true positive, could reference a child playbook. You need to pass variables from the parent playbook to the child playbook.

Place the steps needed to accomplish this in the correct order.

Question # 7


Expert Solution
Questions # 8:

Which three statements accurately describe step utilities in a playbook step? (Choose three answers)

Options:

A.

The Timeout step utility sets a maximum execution time for the step and terminates playbook execution if exceeded.


B.

The Loop step utility can only be used once in each playbook step.


C.

The Variables step utility stores the output of the step directly in the step itself.


D.

The Condition step utility behavior changes depending on if a loop exists for that step.


E.

The Mock Output step utility uses HTML format to simulate real outputs.


Expert Solution
Questions # 9:

Refer to Exhibit:

You are tasked with reviewing a new FortiAnalyzer deployment in a network with multiple registered logging devices. There is only one FortiAnalyzer in the topology.

Which potential problem do you observe?

Options:

A.

The disk space allocated is insufficient.


B.

The analytics-to-archive ratio is misconfigured.


C.

The analytics retention period is too long.


D.

The archive retention period is too long.


Expert Solution
Questions # 10:

Which two playbook triggers enable the use of trigger events in later tasks as trigger variables? (Choose two.)

Options:

A.

EVENT


B.

INCIDENT


C.

ON SCHEDULE


D.

ON DEMAND


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions