FCP_FAZ_AN-7.4 Practice Test Questions

56 Questions


As part of your analysis, you discover that an incident is a false positive. You change the incident status to Closed: False Positive.
Which statement about your update is true?


A. The audit history log will be updated.


B. The corresponding event will be marked as mitigated.


C. The incident will be deleted.


D. The incident number will be changed





A.
  The audit history log will be updated.

Explanation: When an incident in FortiAnalyzer is identified as a false positive and its status is updated to "Closed: False Positive," certain records and logs are updated to reflect this change.
Option A - The Audit History Log Will Be Updated:
Option B - The Corresponding Event Will Be Marked as Mitigated:
Option C - The Incident Will Be Deleted:
Option D - The Incident Number Will Be Changed:
Conclusion:
Correct Answer: A. The audit history log will be updated.
This is the most accurate answer, as the update to "Closed: False Positive" is recorded in FortiAnalyzer’s audit history log for accountability and tracking purposes.
References:
FortiAnalyzer 7.4.1 documentation on incident management and audit history logging.

After a generated a repot, you notice the information you were expecting to see in not included in it. However, you confirm that the logs are there:
Which two actions should you perform? (Choose two.)


A. Check the time frame covered by the report.


B. Disable auto-cache.


C. Increase the report utilization quota.


D. Test the dataset.





A.
  Check the time frame covered by the report.

D.
  Test the dataset.

What is the purpose of running the command diagnose sql status sqlreportd?


A. To view a list of scheduled reports


B. To list the current SQL processes running


C. To display the SQL query connections and hcache status


D. To identify the database log insertion status





C.
  To display the SQL query connections and hcache status

Explanation: The command diagnose sql status sqlreportd is used in FortiAnalyzer to obtain specific information about the SQL reporting process and caching status. Here’s what this command accomplishes and an analysis of each option:
Command Functionality:
Option Analysis:
Conclusion:
Correct Answer: C. To display the SQL query connections and hcache status This command is used to monitor SQL reporting activities and cache status, aiding in the analysis of report generation performance and connection health.

Which SQL query is in the correct order to query to database in the FortiAnalyzer?


A. SELECT devid FROM $log GROUP BY devid WHERE ‘user’,,’ users1’


B. SELECT FROM $log WHERE devid ‘user’,, USER1’ GROUP BY devid


C. SELCT devid WHERE ’user’-‘ USER1’ FROM $log GROUP By devid


D. SELECT devid FROM $log WHERE ‘user’=’ GROUP BY devid





D.
  SELECT devid FROM $log WHERE ‘user’=’ GROUP BY devid

Explanation: In FortiAnalyzer’s SQL query syntax, the typical order for querying the database follows the standard SQL format, which is:
SELECT FROM

WHERE GROUP BY Option D correctly follows this structure:
Let’s briefly examine why the other options are incorrect:
Option A: SELECT devid FROM $log GROUP BY devid WHERE 'user', 'users1'
Option B: SELECT FROM $log WHERE devid 'user', USER1' GROUP BY devid
Option C: SELCT devid WHERE 'user' - 'USER1' FROM $log GROUP BY devid
References: FortiAnalyzer documentation for SQL queries indicates that the standard SQL order should be followed when querying logs in FortiAnalyzer. Queries should follow the format SELECT ... FROM ... WHERE ... GROUP BY ..., as demonstrated in option D.

Why must you wait for several minutes before you run a playbook that you just created?


A. FortiAnalyzer needs that time to parse the new playbook.


B. FortiAnalyzer needs that time to debug the new playbook.


C. FortiAnalyzer needs that time to back up the current playbooks.


D. FortiAnalyzer needs that time to ensure there are no other playbooks running





A.
  FortiAnalyzer needs that time to parse the new playbook.

Explanation: When a new playbook is created on FortiAnalyzer, the system requires some time to parse and validate the playbook before it can be executed. Parsing involves checking the playbook's structure, ensuring that all syntax and logic are correct, and preparing the playbook for execution within FortiAnalyzer’s automation engine. This initial parsing step is necessary for FortiAnalyzer to load the playbook into its operational environment correctly.
Here’s why the other options are incorrect:
Option A: FortiAnalyzer needs that time to parse the new playbook
Option B: FortiAnalyzer needs that time to debug the new playbook
Option C: FortiAnalyzer needs that time to back up the current playbooks
Option D: FortiAnalyzer needs that time to ensure there are no other playbooks running
References: FortiAnalyzer documentation states that after creating a playbook, a brief delay is expected as the system parses and validates the playbook. This ensures that any syntax errors or logical inconsistencies are resolved before the playbook is executed, making option A the correct answer.

Which FortiAnalyzer feature allows you to use a proactive approach when managing your network security?


A. FortiView Monitor


B. Outbreak alert services


C. Incidents dashboard


D. Threat hunting





D.
  Threat hunting

Explanation: FortiAnalyzer offers several features for monitoring, alerting, and incident management, each serving different purposes. Let's examine each option to determine which one best supports a proactive security approach.
Option A - FortiView Monitor:
Option B - Outbreak Alert Services:
Option C - Incidents Dashboard:
Option D - Threat Hunting:
Conclusion:
Correct Answer: D. Threat hunting
Threat hunting is the most proactive feature among the options, as it involves actively searching for threats within the network rather than reacting to already detected incidents.
References:
FortiAnalyzer 7.4.1 documentation on Threat Hunting and proactive security measures.

Exhibit.



Laptop1 is used by several administrators to manage FotiAnalyzer. You want to configure a generic text filter that matches all login attempts to the web interface generated by any user other than admin’’, and coming from Laptop1.
Which filter will achieve the desired result?


A. Operation-login and performed_on==’’GUI(10.1.1.100)’ and user!=admin


B. Operation-login and performed_on==’’GU (10.1.1.120)’ and user!=admin


C. Operation-login and srcip== 10.1.1.100 and dstip==10.1.1.1.210 and user==admin


D. Operation-login and dstip==10.1.1.210 and user!-admin





A.
  Operation-login and performed_on==’’GUI(10.1.1.100)’ and user!=admin

Explanation: The objective is to create a filter that identifies all login attempts to the FortiAnalyzer web interface (GUI) coming from Laptop1 (IP 10.1.1.100) and excludes the admin user. This filter should match any user other than admin.
Filter Components Analysis:
Option Analysis:
Conclusion:
Correct Answer: A. Operation-login and performed_on==’’GUI(10.1.1.100)’ and user!=admin
This filter precisely captures the required conditions: login attempts from Laptop1 to the GUI interface by any user except admin.
References:
FortiAnalyzer 7.4.1 documentation on log filters, syntax for login operations, and GUI login tracking.

Which statement describes archive logs on FortiAnalyzer?


A. Logs that are indexed and stored in the SQL database


B. Logs a FortiAnalyzer administrator can access in FortiView


C. Logs compressed and saved in files with the .gz extension


D. Logs previously collected from devices that are offline





C.
  Logs compressed and saved in files with the .gz extension

Explanation: In FortiAnalyzer, archive logs refer to logs that have been compressed and stored to save space. This process involves compressing the raw log files into the .gz format, which is a common compression format used in Fortinet systems for archived data.
Archiving is essential in FortiAnalyzer to optimize storage and manage long-term retention of logs without impacting performance.
Let’s examine each option for clarity:
Option A: Logs that are indexed and stored in the SQL database
Option B: Logs a FortiAnalyzer administrator can access in FortiView
Option C: Logs compressed and saved in files with the .gz extension
Option D: Logs previously collected from devices that are offline
References: FortiAnalyzer 7.4.1 documentation and configuration guides outline that archived logs are stored in compressed files with the .gz extension to conserve storage space, ensuring FortiAnalyzer can handle a larger volume of logs over extended periods.

Exhibit.



What can you conclude about these search results? (Choose two.)


A. They can be downloaded to a file.


B. They are sortable by columns and customizable.


C. They are not available for analysis in FortiView.


D. They were searched by using text mode.





A.
  They can be downloaded to a file.

D.
  They were searched by using text mode.

Explanation: In this exhibit, we observe a search query on the FortiAnalyzer interface displaying log data with details about the connection events, including fields like date, srcip, dstip, service, and dstintf. This setup allows for several functionalities within FortiAnalyzer.
Option A - Download Capability:
Option B - Sorting and Customization:
Option C - Availability in FortiView:
Option D - Text Mode Search:
Conclusion:
Correct Answer: A. They can be downloaded to a file. and B. They are sortable by columns and customizable.
These options are consistent with FortiAnalyzer's capabilities for managing, exporting, and customizing log data.
References:
FortiAnalyzer 7.4.1 documentation on search, export functionalities, and customizable views.

Which statement about sending notifications with incident update is true?


A. You can send notifications to multiple external platforms.


B. Notifications can be sent only by email.


C. If you use multiple fabric connectors, all connectors must have the same settings.


D. Notifications can be sent only when an incident is updated or deleted.





A.
  You can send notifications to multiple external platforms.

Explanation: In FortiOS and FortiAnalyzer, incident notifications can be sent to multiple external platforms, not limited to a single method such as email. Fortinet's security fabric and integration capabilities allow notifications to be sent through various fabric connectors and third-party integrations. This flexibility is designed to ensure that incident updates reach relevant personnel or systems using preferred communication channels, such as email, Syslog, SNMP, or integration with SIEM platforms.
Let’s review each answer option for clarity:
Option A: You can send notifications to multiple external platforms
Option B: Notifications can be sent only by email
Option C: If you use multiple fabric connectors, all connectors must have the same settings
Option D: Notifications can be sent only when an incident is updated or deleted
References: According to FortiOS and FortiAnalyzer 7.4.1 documentation, notifications for incidents can be configured across various platforms by using multiple connectors, and they are not limited to email alone. This capability is part of the Fortinet Security Fabric, allowing for a broad range of integrations with external systems and platforms for effective incident response.

What happens when the indicator of compromise (IOC) engine on FortiAnalyzer finds web logs that match blacklisted IP addresses?


A. FortiAnalyzer flags the associated host for further analysis.


B. A new infected entry is added for the corresponding endpoint under Compromised Hosts.


C. The detection engine classifies those logs as Suspicious.


D. The endpoint is marked as Compromised and, optionally, can be put in quarantine.





B.
  A new infected entry is added for the corresponding endpoint under Compromised Hosts.

A playbook contains five tasks in total. An administrator runs the playbook and four out of five tasks finish successfully, but one task fails.
What will be the status of the playbook after it is run?


A. Attention required


B. Upstream_failed


C. Failed


D. Success





A.
  Attention required

Explanation: In FortiAnalyzer, when a playbook is run, each task’s status impacts the overall playbook status. Here’s what happens based on task outcomes:
Status When All Tasks Succeed:
Status When Some Tasks Fail:
Option Analysis:
Conclusion:
Correct Answer: A. Attention required
The playbook status reflects that it completed, but an error occurred in one of the tasks, prompting the administrator to review the failed task.
References:
FortiAnalyzer 7.4.1 documentation on playbook execution statuses and task error handling.


Page 1 out of 5 Pages