Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

On which disk are the SQLite databases that are used for the baselining stored?

A.

Disk1

B.

Disk4

C.

Disk2

D.

Disk3

Full Access
Question # 5

What is the disadvantage of automatic remediation?

A.

It can make a disruptive change to a user, block access to an application, or disconnect critical systems from the network.

B.

It is equivalent to running an IPS in monitor-only mode — watches but does not block.

C.

External threats or attacks detected by FortiSIEM will need user interaction to take action on an already overworked SOC team.

D.

Threat behaviors occurring during the night could take hours to respond to.

Full Access
Question # 6

Which three statements about collector communication with the FortiSIEM cluster are true? (Choose three.)

A.

The only communication between the collector and the supervisor is during the registration process.

B.

Collectors communicate periodically with the supervisor node.

C.

The supervisor periodically checks the health of the collector.

D.

The supervisor does not initiate any connections to the collector node.

E.

Collectors upload event data to any node in the worker upload list, but report their health directly to the supervisor node.

Full Access
Question # 7

Refer to the exhibit.

Is the Windows agent delivering event logs correctly?

A.

The logs are buffered by the agent and will be sent once the status changes to managed.

B.

The agent is registered and it is sending logs correctly.

C.

The agent is not sending logs because it did not receive a monitoring template.

D.

Because the agent is unmanaged. the logs are dropped silently by the supervisor.

Full Access
Question # 8

In the event of a WAN link failure between the collector and the supervisor, by default, what is the maximum number of event files stored on the collector?

A.

30.000

B.

10.000

C.

40.000

D.

20.000

Full Access
Question # 9

Refer to the exhibit.

The rule evaluates multiple VPN logon failures within a ten-minute window. Consider the following VPN failure events received within a ten-minute window:

How many incidents are generated?

A.

1

B.

2

C.

0

D.

3

Full Access
Question # 10

Refer to the exhibit.

The service provider deployed FortiSIEM without a collector and added three customers on the supervisor.

What mistake did the administrator make?

A.

Customer A and customer B have overlapping IP addresses.

B.

Collectors must be deployed on all customer premises before they are added to organizations on the supervisor.

C.

The number of workers on the FortiSIEM cluster must match the number of customers added.

D.

At least one collector must be deployed to collect logs from service provider infrastructure devices.

Full Access