New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Fortinet Fortinet Certified Professional Security Operations NSE7_SOC_AR-7.6 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

What are three capabilities of the built-in FortiSOAR Jinja editor? (Choose three answers)

Options:

A.

It renders output by combining Jinja expressions and JSON input.


B.

It checks the validity of a Jinja expression.


C.

It creates new records in bulk.


D.

It loads the environment JSON of a recently executed playbook.


E.

It defines conditions to trigger a playbook step.


Expert Solution
Questions # 12:

Refer to the exhibits.

The FortiMail Sender Blocklist playbook is configured to take manual input and add those entries to the FortiMail abc. com domain-level block list. The playbook is configured to use a FortiMail connector and the ADD_SENDER_TO_BLOCKLIST action.

Why is the FortiMail Sender Blocklist playbook execution failing7

Options:

A.

You must use the GET_EMAIL_STATISTICS action first to gather information about email messages.


B.

FortiMail is expecting a fully qualified domain name (FQDN).


C.

The client-side browser does not trust the FortiAnalzyer self-signed certificate.


D.

The connector credentials are incorrect


Expert Solution
Questions # 13:

Which three factors does the FortiSIEM rules engine use to determine the count when it evaluates the aggregate condition COUNT (Matched Events) on a specific subpattern? (Choose three answers)

Options:

A.

Group By attributes


B.

Data source


C.

Time window


D.

Search filter


E.

Incident action


Expert Solution
Questions # 14:

Which statement best describes the MITRE ATT&CK framework?

Options:

A.

It provides a high-level description of common adversary activities, but lacks technical details


B.

It covers tactics, techniques, and procedures, but does not provide information about mitigations.


C.

It describes attack vectors targeting network devices and servers, but not user endpoints.


D.

It contains some techniques or subtechniques that fall under more than one tactic.


Expert Solution
Questions # 15:

Based on the Pyramid of Pain model, which two statements accurately describe the value of an indicator and how difficult it is for an adversary to change? (Choose two answers)

Options:

A.

IP addresses are easy because adversaries can spoof them or move them to new resources.


B.

Tactics, techniques, and procedures are hard because adversaries must adapt their methods.


C.

Artifacts are easy because adversaries can alter file paths or registry keys.


D.

Tools are easy because often, multiple alternatives exist.


Expert Solution
Questions # 16:

Review the following incident report:

Attackers leveraged a phishing email campaign targeting your employees.

The email likely impersonated a trusted source, such as the IT department, and requested login credentials.

An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).

The RAT provided the attackers with remote access and a foothold in the compromised system.

Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)

Options:

A.

Initial Access


B.

Defense Evasion


C.

Lateral Movement


D.

Persistence


Expert Solution
Questions # 17:

Which FortiAnalyzer connector can you use to run automation stitches9

Options:

A.

FortiCASB


B.

FortiMail


C.

Local


D.

FortiOS


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions