Winter Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

For which two purposes would you use the command set log checksum? (Choose two.)

A.

To help protect against man-in-the-middle attacks during log upload from FortiAnalyzer to an SFTP server

B.

To prevent log modification or tampering

C.

To encrypt log communications

D.

To send an identical set of logs to a second logging server

Full Access
Question # 5

Which two constraints can impact the amount of reserved disk space required by FortiAnalyzer? (Choose

two.)

A.

License type

B.

Disk size

C.

Total quota

D.

RAID level

Full Access
Question # 6

Which daemon is responsible for enforcing the log file size?

A.

sqlplugind

B.

logfiled

C.

miglogd

D.

ofrpd

Full Access
Question # 7

What are two advantages of setting up fabric ADOM? (Choose two.)

A.

It can be used for fast data processing and log correlation

B.

It can be used to facilitate communication between devices in same Security Fabric

C.

It can include all Fortinet devices that are part of the same Security Fabric

D.

It can include only FortiGate devices that are part of the same Security Fabric

Full Access
Question # 8

Which two methods can you use to send event notifications when an event occurs that matches a configured

event handler? (Choose two.)

A.

SMS

B.

Email

C.

SNMP

D.

IM

Full Access
Question # 9

What is the purpose of output variables?

A.

To store playbook execution statistics

B.

To use the output of the previous task as the input of the current task

C.

To display details of the connectors used by a playbook

D.

To save all the task settings when a playbook is exported

Full Access
Question # 10

Refer to the exhibit.

What does the data point at 14:55 tell you?

A.

The received rate is almost at its maximum for this device

B.

The sqlplugind daemon is behind in log indexing by two logs

C.

Logs are being dropped

D.

Raw logs are reaching FortiAnalyzer faster than they can be indexed

Full Access
Question # 11

Refer to the exhibit.

The image displays the configuration of a FortiAnalyzer the administrator wants to join to an existing HA cluster.

What can you conclude from the configuration displayed?

A.

This FortiAnalyzer will join to the existing HA cluster as the primary.

B.

This FortiAnalyzer is configured to receive logs in its port1.

C.

This FortiAnalyzer will trigger a failover after losing communication with its peers for 10 seconds.

D.

After joining to the cluster, this FortiAnalyzer will keep an updated log database.

Full Access
Question # 12

Refer to the exhibit.

Laptopt is used by several administrators to manage FortiAnalyzer. You want to configure a generic text filter that matches all login attempts to the web interface generated by any user other than "admin" and coming from Laptop1:

Which filter will achieve the desired result?

A.

operation-login & performed_on=="GUI(10.1.1.100)" & user!=admin

B.

operation-login & srcip==10.1.1.100 & dstip==10.1.1.210 & user==admin

C.

operation-login & dstip==10.1.1.210 & userl-admin

D.

operation-login & performed_on=="GUI(10.1.1.210)' & user!=admin

Full Access
Question # 13

In the FortiAnalyzer FortiView, source and destination IP addresses from FortiGate devices are not resolving to a hostname.

How can you resolve the source and destination IP addresses, without introducing any additional performance impact to FortiAnalyzer?

A.

Resolve IP addresses on a per-ADOM basis to reduce delay on FortiView while IPs resolve

B.

Configure # set resolve-ip enable in the system FortiView settings

C.

Configure local DNS servers on FortiAnalyzer

D.

Resolve IP addresses on FortiGate

Full Access
Question # 14

What is the recommended method of expanding disk space on a FortiAnalyzer VM?

A.

From the VM host manager, add an additional virtual disk and use the #execute lvm extend command to expand the storage

B.

From the VM host manager, expand the size of the existing virtual disk

C.

From the VM host manager, expand the size of the existing virtual disk and use the # execute format disk command to reformat the disk

D.

From the VM host manager, add an additional virtual disk and rebuild your RAID array

Full Access
Question # 15

View the exhibit.

Why is the total quota less than the total system storage?

A.

3.6% of the system storage is already being used.

B.

Some space is reserved for system use, such as storage of compression files, upload files, and temporary report files

C.

The oftpd process has not archived the logs yet

D.

The logfiled process is just estimating the total quota

Full Access
Question # 16

What FortiGate process caches logs when FortiAnalyzer is not reachable?

A.

logfiled

B.

sqlplugind

C.

oftpd

D.

miglogd

Full Access
Question # 17

Refer to the exhibit.

Which statement is correct regarding the event displayed?

A.

The security risk was blocked or dropped.

B.

The security event risk is considered open.

C.

An incident was created from this event.

D.

The risk source is isolated.

Full Access