Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

You need to upgrade your FortiAnalyzer firmware.

What happens to the logs being sent to FortiAnalyzer from FortiGate during the time FortiAnalyzer is

temporarily unavailable?

A.

FortiAnalyzer uses log fetching to retrieve the logs when back online

B.

FortiGate uses the miglogd process to cache the logs

C.

The logfiled process stores logs in offline mode

D.

Logs are dropped

Full Access
Question # 5

Which tabs do not appear when FortiAnalyzer is operating in Collector mode?

A.

FortiView

B.

Event Management

C.

Device Manger

D.

Reporting

Full Access
Question # 6

What purposes does the auto-cache setting on reports serve? (Choose two.)

A.

To reduce report generation time

B.

To automatically update the hcache when new logs arrive

C.

To reduce the log insert lag rate

D.

To provide diagnostics on report generation time

Full Access
Question # 7

Refer to the exhibit.

The exhibit shows “remoteservergroup” is an authentication server group with LDAP and RADIUS servers.

Which two statements express the significance of enabling “Match all users on remote server” when configuring a new administrator? (Choose two.)

A.

It creates a wildcard administrator using LDAP and RADIUS servers.

B.

Administrator can log in to FortiAnalyzer using their credentials on remote servers LDAP and RADIUS.

C.

Use remoteadmin from LDAP and RADIUS servers will be able to log in to FortiAnalyzer at anytime.

D.

It allows administrators to use two-factor authentication.

Full Access
Question # 8

What is the best approach to handle a hard disk failure on a FortiAnalyzer that supports hardware RAID?

A.

There is no need to do anything because the disk will self-recover.

B.

Run execute format disk to format and restart the FortiAnalyzer device.

C.

Perform a hot swap of the disk.

D.

Shut down FortiAnalyzer and replace the disk.

Full Access
Question # 9

An administrator has moved FortiGate A from the root ADOM to ADOM1.

Which two statements are true regarding logs? (Choose two.)

A.

Analytics logs will be moved to ADOM1 from the root ADOM automatically.

B.

Archived logs will be moved to ADOM1 from the root ADOM automatically.

C.

Logs will be presented in both ADOMs immediately after the move.

D.

Analytics logs will be moved to ADOM1 from the root ADOM after you rebuild the ADOM1 SQL database.

Full Access
Question # 10

An administrator has configured the following settings:

What is the purpose of executing these commands?

A.

To record the hash value and authentication code of log files.

B.

To encrypt log transfer between FortiAnalyzer and other devices.

C.

To create the secure channel used by the OFTP process.

D.

To verify the integrity of the log files received.

Full Access
Question # 11

Refer to the exhibit.

The capture displayed was taken on a FortiAnalyzer.

Why is a single IP address shown as the source for all logs received?

A.

FortiAnalyzer is using the device MAC addresses to differentiate their logs.

B.

The logs belong to devices that are part of a high availability (HA) cluster.

C.

FortiAnalyzer is receiving logs from the root FortiGate of a Security Fabric.

D.

The device sending logs has two VDOMs in the same ADOM.

Full Access
Question # 12

What can the CLI command # diagnose test application oftpd 3 help you to determine?

A.

What devices and IP addresses are connecting to FortiAnalyzer

B.

What logs, if any, are reaching FortiAnalyzer

C.

What ADOMs are enabled and configured

D.

What devices are registered and unregistered

Full Access
Question # 13

What happens when the IOC breach detection engine on FortiAnalyzer finds web logs that match a blocklisted IP address?

A.

The endpoint is marked as Compromised and. optionally, can be put in quarantine.

B.

FortiAnalyzer flags the associated host for further analysis.

C.

A new Infected entry is added for the corresponding endpoint.

D.

The detection engine classifies those logs as Suspicious

Full Access
Question # 14

Which two statements are true regarding fabric connectors? (Choose two.)

A.

Configuring fabric connectors to send notification to ITSM platform upon incident creation Is more efficient than third-party information from the FortiAnalyzer API.

B.

Fabric connectors allow to save storage costs and improve redundancy.

C.

Storage connector service does not require a separate license to send logs to cloud platform.

D.

Cloud-Out connections allow you to send real-time logs to pubic cloud accounts like Amazon S3, Azure Blob , and Google Cloud.

Full Access
Question # 15

Which three RAID configurations provide fault tolerance on FortiAnalyzer? (Choose three.)

A.

RAIDO

B.

RAID 5

C.

RAID1

D.

RAID 6+0

E.

RAID 0+0

Full Access
Question # 16

Why should you use an NTP server on FortiAnalyzer and all registered devices that log into FortiAnalyzer?

A.

To properly correlate logs

B.

To use real-time forwarding

C.

To resolve host names

D.

To improve DNS response times

Full Access
Question # 17

Which two statements are true regarding high availability (HA) on FortiAnalyzer? (Choose two.)

A.

FortiAnalyzer HA can function without VRRP. and VRRP is required only if you have more than two FortiAnalyzer devices in a cluster.

B.

FortiAnalyzer HA supports synchronization of logs as well as some system and configuration settings.

C.

All devices in a FortiAnalyzer HA cluster must run in the same operation mode: analyzer or collector.

D.

FortiAnalyzer HA implementation is supported by many public cloud infrastructures such as AWS, Microsoft Azure, and Google Cloud.

Full Access
Question # 18

What are analytics logs on FortiAnalyzer?

A.

Log type Traffic logs.

B.

Logs that roll over when the log file reaches a specific size.

C.

Logs that are indexed and stored in the SQL.

D.

Raw logs that are compressed and saved to a log file.

Full Access
Question # 19

How do you restrict an administrator’s access to a subset of your organization’s ADOMs?

A.

Set the ADOM mode to Advanced

B.

Assign the ADOMs to the administrator’s account

C.

Configure trusted hosts

D.

Assign the default Super_User administrator profile

Full Access
Question # 20

What are two advantages of setting up fabric ADOM? (Choose two.)

A.

It can be used for fast data processing and log correlation

B.

It can be used to facilitate communication between devices in same Security Fabric

C.

It can include all Fortinet devices that are part of the same Security Fabric

D.

It can include only FortiGate devices that are part of the same Security Fabric

Full Access
Question # 21

Refer to the exhibit.

What is the purpose of configuring FortiAnalyzer with the settings displayed in the image?

A.

To increase reliability

B.

To expand bandwidth

C.

To maximize resiliency

D.

To improve security

Full Access
Question # 22

Which statement about the FortiSOAR management extension is correct?

A.

It requires a FortiManager configured to manage FortiGate

B.

It requires a dedicated FortiSOAR device or VM.

C.

It does not include a limited trial by default.

D.

It runs as a docker container on FortiAnalyzer

Full Access
Question # 23

How can you attach a report to an incident?

A.

By attaching it to an event handler alert

B.

By editing the settings of the desired report

C.

From the properties of an existing incident

D.

Saving it in JSON format, and then importing it

Full Access
Question # 24

An administrator has configured the following settings:

config system global

set log-checksum md5-auth

end

What is the significance of executing this command?

A.

This command records the log file MD5 hash value.

B.

This command records passwords in log files and encrypts them.

C.

This command encrypts log transfer between FortiAnalyzer and other devices.

D.

This command records the log file MD5 hash value and authentication code.

Full Access
Question # 25

In a Fortinet Security Fabric, what can make an upstream FortiGate create traffic logs associated with sessions initiated on downstream FortiGate devices?

A.

The traffic destination is another FortiGate in the fabric.

B.

The upstream FortiGate is configured to do NAT

C.

Log redundancy is configured in the fabric.

D.

The downstream device cannot connect to FortiAnalyzer.

Full Access
Question # 26

Which statement is true regarding Macros on FortiAnalyzer?

A.

Macros are ADOM specific and each ADOM will have unique macros relevant to that ADOM.

B.

Macros are supported only on the FortiGate ADOM.

C.

Macros are useful in generating excel log files automatically based on the reports settings.

D.

Macros are predefined templates for reports and cannot be customized.

Full Access
Question # 27

On FortiAnalyzer, what is a wildcard administrator account?

A.

An account that permits access to members of an LDAP group

B.

An account that allows guest access with read-only privileges

C.

An account that requires two-factor authentication

D.

An account that validates against any user account on a FortiAuthenticator

Full Access
Question # 28

What is Log Insert Lag Time on FortiAnalyzer?

A.

The number of times in the logs where end users experienced slowness while accessing resources.

B.

The amount of lag time that occurs when the administrator is rebuilding the ADOM database.

C.

The amount of time that passes between the time a log was received and when it was indexed on FortiAnalyzer.

D.

The amount of time FortiAnalyzer takes to receive logs from a registered device

Full Access
Question # 29

In order for FortiAnalyzer to collect logs from a FortiGate device, what configuration is required? (Choose two.)

A.

Remote logging must be enabled on FortiGate

B.

Log encryption must be enabled

C.

ADOMs must be enabled

D.

FortiGate must be registered with FortiAnalyzer

Full Access
Question # 30

What is the purpose of the FortiAnalyzer command execute format disk?

A.

To reset all settings from flash except the current IP addresses and routes.

B.

To erase all device settings and images, databases, and log data from the disk, but preserve the IP and routing info.

C.

To perform a low-level format of the disk overwriting the hard disk with random data.

D.

To reset to factory default settings from flash.

Full Access
Question # 31

Refer to the exhibit.

Which image corresponds to the packet capture shown in the exhibit?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

Which statement correctly describes the management extensions available on FortiAnalyzer?

A.

Management extensions do not require additional licenses.

B.

Management extensions allow FortiAnalyzer to act as a ForbSIEM supervisor.

C.

Management extensions require a dedicated VM for best performance.

D.

Management extensions may require a minimum number of CPU cores to run.

Full Access
Question # 33

What must you configure on FortiAnalyzer to upload a FortiAnalyzer report to a supported external server?

(Choose two.)

A.

SFTP, FTP, or SCP server

B.

Mail server

C.

Output profile

D.

Report scheduling

Full Access
Question # 34

A play book contains five tasks in total. An administrator executed the playbook and four out of five tasks finished successfully, but one task failed. What will be the status of the playbook after its execution?

A.

Success

B.

Failed

C.

Running

D.

Upstream_failed

Full Access
Question # 35

What remote authentication servers can you configure to validate your FortiAnalyzer administrator logons? (Choose three)

A.

RADIUS

B.

Local

C.

LDAP

D.

PKI

E.

TACACS+

Full Access
Question # 36

Which statement correctly describes RAID 10 (1+0) on FortiAnalyzer?

A.

A configuration with four disks, each with 2 TB of capacity, provides a total space of 4 TB.

B It combines mirroring striping and distributed parity to provide performance and fault tolerance

B.

A configuration with four disks, each with 2 TB of capacity, provides a total space of 2 TB.

C.

It uses striping to provide performance and fault tolerance.

Full Access
Question # 37

Which two statements regarding ADOM modes are true? (Choose two.)

A.

In normal mode, the disk quota of the ADOM is fixed and cannot be modified, but in advanced mode, the disk quota of the ADOM is flexible.

B.

You can change ADOM modes only through the CLI.

C.

In an advanced mode ADOM, you can assign FortiGate VDOMs from a single FortiGate device to multiple FortiAnalyzer ADOMs.

D.

Normal mode is the default ADOM mode.

Full Access
Question # 38

What is the purpose of the FortiAnalyzer command diagnose system print netstat?

A.

It provides network statistics for active connections, including the protocols, IP addresses, and connection states.

B.

It provides the complete routing table, including directly connected routes.

C.

It provides the static DNS table, including the host names and their expiration timers.

D.

It provides NTP server information, including server IPs. stratum, poll time, and latency.

Full Access
Question # 39

Which two parameters impact the amount of reserved disk space required by FortiAnalyzer? (Choose two.)

A.

Total quota

B.

License type

C.

RAID level

D.

Disk size

Full Access
Question # 40

Which item must you configure on FortiAnalyzer to email generated reports automatically?

A.

Output profile

B.

Report scheduling

C.

SFTP server

D.

SNMP server

Full Access
Question # 41

You are trying to initiate an authorization request from FortiGate to FortiAnalyzer, but the Security Fabric window does not open when you click Authorize.

Which two reasons can cause this to happen? (Choose two.)

A.

A pre-shared key needs to be established on both sides.

B.

The management computer does not have connectivity to the authorization IP address and port combination.

C.

The Security Fabric root is unauthorized and needs to be added as a trusted host.

D.

The fabric authorization settings on FortiAnalyzer are misconfigured.

Full Access
Question # 42

Refer to the exhibit.

Laptopt is used by several administrators to manage FortiAnalyzer. You want to configure a generic text filter that matches all login attempts to the web interface generated by any user other than "admin" and coming from Laptop1:

Which filter will achieve the desired result?

A.

operation-login & performed_on=="GUI(10.1.1.100)" & user!=admin

B.

operation-login & srcip==10.1.1.100 & dstip==10.1.1.210 & user==admin

C.

operation-login & dstip==10.1.1.210 & userl-admin

D.

operation-login & performed_on=="GUI(10.1.1.210)' & user!=admin

Full Access
Question # 43

Refer to the exhibit.

What does the data point at 14:55 tell you?

A.

The received rate is almost at its maximum for this device

B.

The sqlplugind daemon is behind in log indexing by two logs

C.

Logs are being dropped

D.

Raw logs are reaching FortiAnalyzer faster than they can be indexed

Full Access
Question # 44

If you upgrade your FortiAnalyzer firmware, what report elements can be affected?

A.

Output profiles

B.

Report settings

C.

Report scheduling

D.

Custom datasets

Full Access
Question # 45

What are the operating modes of FortiAnalyzer? (Choose two)

A.

Standalone

B.

Manager

C.

Analyzer

D.

Collector

Full Access
Question # 46

A rogue administrator was accessing FortiAnalyzer without permission, and you are tasked to see what activity was performed by that rogue administrator on FortiAnalyzer.

What can you do on FortiAnalyzer to accomplish this?

A.

Click FortiView and generate a report for that administrator.

B.

Click Task Monitor and view the tasks performed by that administrator.

C.

Click Log View and generate a report for that administrator.

D.

View the tasks performed by the rogue administrator in Fabric View.

Full Access
Question # 47

Logs are being deleted from one of the ADOMs earlier than the configured setting for archiving in the data

policy.

What is the most likely problem?

A.

CPU resources are too high

B.

Logs in that ADOM are being forwarded, in real-time, to another FortiAnalyzer device

C.

The total disk space is insufficient and you need to add other disk

D.

The ADOM disk quota is set too low, based on log rates

Full Access
Question # 48

After generating a report, you notice the information you were expecting to see is not included in it. What are two possible reasons for this scenario? (Choose two.)

A.

You enabled auto-cache with extended log filtering.

B.

The logfiled service has not indexed all the expected logs.

C.

The logs were overwritten by the data retention policy.

D.

The time frame selected in the report is wrong.

Full Access
Question # 49

Which statements are correct regarding FortiAnalyzer reports? (Choose two)

A.

FortiAnalyzer provides the ability to create custom reports.

B.

FortiAnalyzer glows you to schedule reports to run.

C.

FortiAnalyzer includes pre-defined reports only.

D.

FortiAnalyzer allows reporting for FortiGate devices only.

Full Access
Question # 50

By default, what happens when a log file reaches its maximum file size?

A.

FortiAnalyzer overwrites the log files.

B.

FortiAnalyzer stops logging.

C.

FortiAnalyzer rolls the active log by renaming the file.

D.

FortiAnalyzer forwards logs to syslog.

Full Access
Question # 51

What is the main purpose of using an NTP server on FortiAnalyzer and all of its registered devices?

A.

Log correlation

B.

Host name resolution

C.

Log collection

D.

Real-time forwarding

Full Access
Question # 52

In the FortiAnalyzer FortiView, source and destination IP addresses from FortiGate devices are not resolving to a hostname.

How can you resolve the source and destination IP addresses, without introducing any additional performance impact to FortiAnalyzer?

A.

Resolve IP addresses on a per-ADOM basis to reduce delay on FortiView while IPs resolve

B.

Configure # set resolve-ip enable in the system FortiView settings

C.

Configure local DNS servers on FortiAnalyzer

D.

Resolve IP addresses on FortiGate

Full Access
Question # 53

What can you do on FortiAnalyzer to restrict administrative access from specific locations?

A.

Configure trusted hosts for that administrator.

B.

Enable geo-location services on accessible interface.

C.

Configure two-factor authentication with a remote RADIUS server.

D.

Configure an ADOM for respective location.

Full Access