Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Fortinet NSE 7 - Security Operations 7.6 Architect

Last Update 2 hours ago Total Questions : 57

The Fortinet NSE 7 - Security Operations 7.6 Architect content is now fully updated, with all current exam questions added 2 hours ago. Deciding to include NSE7_SOC_AR-7.6 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our NSE7_SOC_AR-7.6 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these NSE7_SOC_AR-7.6 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Fortinet NSE 7 - Security Operations 7.6 Architect practice test comfortably within the allotted time.

Question # 1

Which two types of variables can you use in playbook tasks? (Choose two.)

A.

input

B.

Output

C.

Create

D.

Trigger

Question # 2

Which three end user logs does FortiAnalyzer use to identify possible IOC compromised hosts? (Choose three.)

A.

Email filter logs

B.

DNS filter logs

C.

Application filter logs

D.

IPS logs

E.

Web filter logs

Question # 3

A customer wants FortiAnalyzer to run an automation stitch that executes a CLI command on FortiGate to block a predefined list of URLs, if a botnet command-and-control (C & C) server IP is detected.

Which FortiAnalyzer feature must you use to start this automation process?

A.

Playbook

B.

Data selector

C.

Event handler

D.

Connector

Question # 4

You are trying to create a playbook that creates a manual task showing a list of public IPv6 addresses. You were successful in extracting all IP addresses from a previous action into a variable calledip_list, which contains both private and public IPv4 and IPv6 addresses. You must now filter the results to display only public IPv6 addresses. Which two Jinja expressions can accomplish this task? (Choose two answers)

A.

{{ vars.ip_list | ipv6addr( ' public ' ) }}

B.

{{ vars.ip_list | ipaddr( ' public ' ) | ipv6 }}

C.

{{ vars.ip_list | ipaddr( ' !private ' ) | ipv6 }}

D.

{{ vars.ip_list | ipv6 | ipaddr( ' public ' ) }}

Question # 5

Review the incident report:

An attacker identified employee names, roles, and email patterns from public press releases, which were then used to craft tailored emails.

The emails were directed to recipients to review an attached agenda using a link hosted off the corporate domain.

Which two MITRE ATT & CK tactics best fit this report? (Choose two answers)

A.

Reconnaissance

B.

Discovery

C.

Initial Access

D.

Defense Evasion

Question # 6

Which two playbook triggers enable the use of trigger events in later tasks as trigger variables? (Choose two.)

A.

EVENT

B.

INCIDENT

C.

ON SCHEDULE

D.

ON DEMAND

Question # 7

Refer to the exhibits.

What can you conclude from analyzing the data using the threat hunting module?

A.

Spearphishing is being used to elicit sensitive information.

B.

DNS tunneling is being used to extract confidential data from the local network.

C.

Reconnaissance is being used to gather victim identity information from the mail server.

D.

FTP is being used as command-and-control (C & C) technique to mine for data.

Question # 8

Refer to Exhibit:

A SOC analyst is designing a playbook to filter for a high severity event and attach the event information to an incident.

Which local connector action must the analyst use in this scenario?

A.

Get Events

B.

Update Incident

C.

Update Asset and Identity

D.

Attach Data to Incident

Question # 9

According to the National Institute of Standards and Technology (NIST) cybersecurity framework, incident handling activities can be divided into phases.

In which incident handling phase do you quarantine a compromised host in order to prevent an adversary from using it as a stepping stone to the next phase of an attack?

A.

Containment

B.

Analysis

C.

Eradication

D.

Recovery

Question # 10

Exhibit:

Which observation about this FortiAnalyzer Fabric deployment architecture is true?

A.

The AMER HQ SOC team cannot run automation playbooks from the Fabric supervisor.

B.

The AMER HQ SOC team must configure high availability (HA) for the supervisor node.

C.

The EMEA SOC team has access to historical logs only.

D.

The APAC SOC team has access to FortiView and other reporting functions.

Go to page: