Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet NSE5_FSM-6.3 - Fortinet NSE 5 - FortiSIEM 6.3

Page: 1 / 2
Total 64 questions

If a performance rule is triggered repeatedly due to high CPU use, what occurs in the incident table?

A.

A now incident is created each time the rule is triggered. and the First Seen and Last Seen times are updated.

B.

A new incident is created based on the Rule Frequency value, and the First Seen and Last Seen times ate updated.

C.

The Incident Count value increases, and the First Seen and Last Seen times update.

D.

The incident status changes to Repeated, and the First Seen and Last Seen times are updated.

Refer to the exhibit.

Which section contains the sortings that determine how many incidents are created?

A.

Actions

B.

Group By

C.

Aggregate

D.

Filters

Refer to the exhibit.

The output shows that the license is in which condition?

A.

The license is supported.

B.

The license is in an active stale.

C.

The license is invalid.

D.

The offline registration of the license is successful.

Which is a requirement for implementing FortiSIEM disaster recovery?

A.

All worker nodes must access both supervisor nodes using IP.

B.

SNMP, and WMI ports must be open between the two supervisor nodes.

C.

The two supervisor nodes must have layer 2 connectivity.

D.

DNS names must be used for the worker upload addresses.

Which database is used for storing anomaly data, that is calculated for different parameters, such as traffic and device resource usage running averages, and standard deviation values?

A.

Profile DB

B.

Event DB

C.

CMDB

D.

SVN DB

Refer to the exhibit.

What does the pauso icon indicate?

A.

Data collection is paused after the intervals shown for metrics.

B.

Data collection has not started.

C.

Data collection execution failed because the device is not reachable.

D.

Data collection is paused duo to an issue, such as a change of password.

How is a subpattern for a rule defined?

A.

Filters, Aggregation, Group by definitions

B.

Filters, Group By definitions, Threshold

C.

Filters, Threshold, Time Window definitions

D.

Filters, Aggregation, Time Window definitions

An administrator is using SNMP and WMI credentials to discover a Windows device. How will the WMI method handle this?

A.

WMI method will collect only traffic and IIS logs.

B.

WMI method will collect only DNS logs.

C.

WMI method will collect only DHCP logs.

D.

WMI method will collect security, application, and system events logs.

Consider the storage of anomaly baseline date that is calculated for different parameters. Which database is used for storing this data?

A.

Event DB

B.

Profile DB

C.

SVNDB

D.

CMDB

In which state can a device be moved into the CMDB to prevent monitoring log collection?

A.

Unmanaged

B.

Unapproved

C.

Pending

D.

Void