For which two purposes would you use the command set log checksum? (Choose two.)
Answer : A, B
To prevent log modification or tampering: The set log-checksum command with options like md5 or sha1 calculates a checksum value for the log data. This checksum acts as a digital signature, allowing FortiAnalyzer to verify the integrity of the logs and detect any unauthorized modifications.
To protect log data from man-in-the-middle attacks: By using checksums, FortiAnalyzer can ensure that the logs received have not been altered in transit during a man-in-the-middle attack. If the checksum of the received logs doesn't match the expected value, it indicates potential tampering.
FortiAnalyzer_7.0_Study_Guide-Online page 149
Which two methods are the most common methods to control and restrict administrative access on FortiAnalyzer? (Choose two.)
View the exhibit.
Why is the total quota less than the total system storage?
What is the purpose of trigger variables?
Answer : A
View the exhibit.
What does the data point at 14:35 tell you?
If you upgrade your FortiAnalyzer firmware, what report elements can be affected?
Answer : D
What is the main purpose of using an NTP server on FortiAnalyzer and all of its registered devices?
Answer : A