Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A customer is experiencing slow performance while executing long, adhoc analytic searches Which FortiSIEM component can make the searches run faster?

A.

Correlation worker

B.

Event worker

C.

Storage worker

D.

Query worker

Full Access
Question # 5

Refer to the exhibit.

How was the FortiGate device discovered by FortiSIEM?

A.

GUI log discovery

B.

Syslog discovery

C.

Pull events discovery

D.

Auto log discovery

Full Access
Question # 6

An administrator is using SNMP and WMI credentials to discover a Windows device. How will the WMI method handle this?

A.

WMI method will collect only traffic and IIS logs.

B.

WMI method will collect only DNS logs.

C.

WMI method will collect only DHCP logs.

D.

WMI method will collect security, application, and system events logs.

Full Access
Question # 7

Which FortiSIEM components are capable of performing device discovery?

A.

FortiSIEM Windows agent

B.

Worker

C.

FortiSIEM Linux agent

D.

Collector

Full Access
Question # 8

Which FortiSIEM components can do performance availability and performance monitoring?

A.

Supervisor, worker, and collector

B.

Supervisor and workers only

C.

Supervisor only

D.

Collectors only

Full Access
Question # 9

Refer to the exhibit.

An administrator is investigating a FortiSIEM license issue.

The procedure is for which offline licensing condition?

A.

The procedure is for offline license debug.

B.

The procedure is for offline license registration.

C.

The procedure is for offline license validation.

D.

The procedure is for offline license verification.

Full Access
Question # 10

Where do you configure rule notifications and automated remediation on FortiSIEM?

A.

Notification policy

B.

Remediation policy

C.

Notification engine

D.

Remediation engine

Full Access
Question # 11

What are the four categories of incidents?

A.

Devices, users, high risk, and low risk

B.

Performance, devices, high risk, and low risk

C.

Performance, availability, security, and change

D.

Security, change, high risk, and low risk

Full Access
Question # 12

Which two FortiSIEM components work together to provide real-time event correlation?

A.

Supervisor and worker

B.

Collector and Windows agent

C.

Worker and collector

D.

Supervisor and collector

Full Access
Question # 13

When configuring collectors located in geographically separated sites, what ports must be open on a front end firewall?

A.

HTTPS, from the collector to the worker upload settings address only

B.

HTTPS, from the collector to the supervisor and worker upload settings addresses

C.

HTTPS, from the Internet to the collector

D.

HTTPS, from the Internet to the collector and from the collector to the FortiSIEM cluster

Full Access
Question # 14

Refer to the exhibit.

What does the pauso icon indicate?

A.

Data collection is paused after the intervals shown for metrics.

B.

Data collection has not started.

C.

Data collection execution failed because the device is not reachable.

D.

Data collection is paused duo to an issue, such as a change of password.

Full Access
Question # 15

An administrator wants to search for events received from Linux and Windows agents.

Which attribute should the administrator use in search filters, to view events received from agents only.

A.

External Event Receive Protocol

B.

Event Received Proto Agents

C.

External Event Receive Raw Logs

D.

External Event Receive Agents

Full Access