Month End Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Fortinet NSE7_SOC_AR-7.6 - Fortinet NSE 7 - Security Operations 7.6 Architect

Page: 2 / 2
Total 57 questions

Refer to the exhibit.

You must configure the FortiGate connector to allow FortiSOAR to perform actions on a firewall. However, the connection fails. Which two configurations are required? (Choose two answers)

A.

Trusted hosts must be enabled and the FortiSOAR IP address must be permitted.

B.

The VDOM name must be specified, or set to VDOM_1, if VDOMs are not enabled on FortiGate.

C.

HTTPS must be enabled on the FortiGate interface that FortiSOAR will communicate with.

D.

An API administrator must be created on FortiGate with the appropriate profile, along with a generated API key to configure on the connector.

Review the incident report:

An attacker identified employee names, roles, and email patterns from public press releases, which were then used to craft tailored emails.

The emails were directed to recipients to review an attached agenda using a link hosted off the corporate domain.

Which two MITRE ATT&CK tactics best fit this report? (Choose two answers)

A.

Reconnaissance

B.

Discovery

C.

Initial Access

D.

Defense Evasion

Which three end user logs does FortiAnalyzer use to identify possible IOC compromised hosts? (Choose three.)

A.

Email filter logs

B.

DNS filter logs

C.

Application filter logs

D.

IPS logs

E.

Web filter logs

Refer to the exhibit.

Which two options describe how the Update Asset and Identity Database playbook is configured? (Choose two.)

A.

The playbook is using a local connector.

B.

The playbook is using a FortiMail connector.

C.

The playbook is using an on-demand trigger.

D.

The playbook is using a FortiClient EMS connector.

Refer to the exhibit.

You configured a playbook namedFalse Positive Close, and want to run it to verify if it works. However, when you clickExecuteand search for the playbook, you do not see it listed. Which two reasons could be the cause of the problem? (Choose two answers)

A.

The playbook must first be published using the Application Editor.

B.

Another instance of the playbook is currently executing.

C.

The Alerts module is not among the list of modules the playbook can execute on.

D.

The manual trigger is configured to require record input to run.

Refer to the exhibits.

The FortiMail Sender Blocklist playbook is configured to take manual input and add those entries to the FortiMail abc. com domain-level block list. The playbook is configured to use a FortiMail connector and the ADD_SENDER_TO_BLOCKLIST action.

Why is the FortiMail Sender Blocklist playbook execution failing7

A.

You must use the GET_EMAIL_STATISTICS action first to gather information about email messages.

B.

FortiMail is expecting a fully qualified domain name (FQDN).

C.

The client-side browser does not trust the FortiAnalzyer self-signed certificate.

D.

The connector credentials are incorrect

Which role does a threat hunter play within a SOC?

A.

investigate and respond to a reported security incident

B.

Collect evidence and determine the impact of a suspected attack

C.

Search for hidden threats inside a network which may have eluded detection

D.

Monitor network logs to identify anomalous behavior