Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet FCSS_SOC_AN-7.4 - FCSS - Security Operations 7.4 Analyst

Page: 1 / 1
Total 32 questions

Which statement describes automation stitch integration between FortiGate and FortiAnalyzer?

A.

An event handler on FortiAnalyzer executes an automation stitch when an event is created.

B.

An automation stitch is configured on FortiAnalyzer and mapped to FortiGate using the FortiOS connector.

C.

An event handler on FortiAnalyzer is configured to send a notification to FortiGate to trigger an automation stitch.

D.

A security profile on FortiGate triggers a violation and FortiGate sends a webhook call to FortiAnalyzer.

According to the National Institute of Standards and Technology (NIST) cybersecurity framework, incident handling activities can be divided into phases.

In which incident handling phase do you quarantine a compromised host in order to prevent an adversary from using it as a stepping stone to the next phase of an attack?

A.

Containment

B.

Analysis

C.

Eradication

D.

Recovery

Which two ways can you create an incident on FortiAnalyzer? (Choose two.)

A.

Using a connector action

B.

Manually, on the Event Monitor page

C.

By running a playbook

D.

Using a custom event handler

Refer to the exhibits.

The Malicious File Detect playbook is configured to create an incident when an event handler generates a malicious file detection event.

Why did the Malicious File Detect playbook execution fail?

A.

The Create Incident task was expecting a name or number as input, but received an incorrect data format

B.

The Get Events task did not retrieve any event data.

C.

The Attach_Data_To_lncident incident task wasexpecting an integer, but received an incorrect data format.

D.

The Attach Data To Incident task failed, which stopped the playbook execution.

Which two types of variables can you use in playbook tasks? (Choose two.)

A.

input

B.

Output

C.

Create

D.

Trigger

Exhibit:

Which observation about this FortiAnalyzer Fabric deployment architecture is true?

A.

The AMER HQ SOC team cannot run automation playbooks from the Fabric supervisor.

B.

The AMER HQ SOC team must configure high availability (HA) for the supervisor node.

C.

The EMEA SOC team has access to historical logs only.

D.

The APAC SOC team has access to FortiView and other reporting functions.

Refer to Exhibit:

A SOC analyst is designing a playbook to filter for a high severity event and attach the event information to an incident.

Which local connector action must the analyst use in this scenario?

A.

Get Events

B.

Update Incident

C.

Update Asset and Identity

D.

Attach Data to Incident

Refer to the exhibits.

You configured a spearphishing event handler and the associated rule. However. FortiAnalyzer did not generate an event.

When you check the FortiAnalyzer log viewer, you confirm that FortiSandbox forwarded the appropriate logs, as shown in the raw log exhibit.

What configuration must you change on FortiAnalyzer in order for FortiAnalyzer to generate an event?

A.

In the Log Type field, changethe selection toAntiVirus Log(malware).

B.

Configure a FortiSandbox data selector and add it tothe event handler.

C.

In the Log Filter by Text field, type the value:.5 ub t ype ma Iwa re..

D.

Change trigger condition by selecting. Within a group, the log field Malware Kame (mname> has 2 or more unique values.

Refer to Exhibit:

A SOC analyst is creating the Malicious File Detected playbook to run when FortiAnalyzer generates a malicious file event. The playbook must also update the incident with the malicious file event data.

What must the next task in this playbook be?

A.

A local connector with the action Update Asset and Identity

B.

A local connector with the action Attach Data to Incident

C.

A local connector with the action Run Report

D.

A local connector with the action Update Incident