Search Header Logo

NSE7 ADVANCE ANALITYS

Authored by Sergio Ortiz

Computers

Professional Development

Used 40+ times

NSE7 ADVANCE ANALITYS
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you invoke an integration policy on FortiSIEM rules?

Through Notification Policy settings

Through Incident Notification settings

Through remediation scripts

Through External Authentication settings

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do customers connect to a shared multi-tenant instance on FortiSOAR?

The MSSP must provide secure network connectivity between the FortiSOAR manager node and the customer devices.

The MSSP must install a Secure Message Exchange node to connect to the customer's shared multi-tenant instance.

The customer must install a tenant node to connect to the MSSP shared multi-tenant instance.

The MSSP must install an agent node on the customer's network to connect to the customer's shared multi-tenant instance.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the event of a WAN link failure between the collector and the supervisor, by default, what is the maximum number of event files stored on the collector?

30,000

10,000

40,000

20,000

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the disadvantage of automatic remediation?

It can make a disruptive change to a user, block access to an application, or disconnect critical systems from the network.

It is equivalent to running an IPS in monitor-only mode — watches but does not block.

External threats or attacks detected by FortiSIEM will need user interaction to take action on an already overworked SOC team.

Threat behaviors occurring during the night could take hours to respond to.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the modes of Data Ingestion on FortiSOAR? (Choose three.)

Rule based

Notification based

App Push

Policy based

Schedule based

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How can you empower SOC by deploying FortiSOAR? (Choose three.)

Aggregate logs from distributed systems

Collaborative knowledge sharing

Baseline user and traffic behavior

Reduce human error

Address analyst skills gap

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are two Tactics in the MITRE ATT&CK framework? (Choose two.)

Rootkit

Reconnaissance

Discovery

BITS Jobs

Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?