Fortinet NSE 5 - FortiAnalyzer 7.6 Analyst FCP_FAZ_AN-7.6 Exam Questions

Page: 1 / 14
Total 66 questions
Question 1

Which statement describes archive logs on FortiAnalyzer?



Answer : C

In FortiAnalyzer, archive logs refer to logs that have been compressed and stored to save space. This process involves compressing the raw log files into the .gz format, which is a common compression format used in Fortinet systems for archived data. Archiving is essential in FortiAnalyzer to optimize storage and manage long-term retention of logs without impacting performance.

Let's examine each option for clarity:

Option A: Logs that are indexed and stored in the SQL database

This is incorrect. While some logs are indexed and stored in an SQL database for quick access and searchability, these are not classified as archive logs. Archived logs are typically moved out of the database and compressed.

Option B: Logs a FortiAnalyzer administrator can access in FortiView

This is incorrect because FortiView primarily accesses logs that are active and indexed, not archived logs. Archived logs are stored for long-term retention but are not readily available for immediate analysis in FortiView.

Option C: Logs compressed and saved in files with the .gz extension

This is correct. Archive logs on FortiAnalyzer are stored in compressed .gz files to reduce space usage. This archived format is used for logs that are no longer immediately needed in the SQL database but are retained for historical or compliance purposes.

Option D: Logs previously collected from devices that are offline

This is incorrect. Although archived logs may include data from devices that are no longer online, this is not a defining characteristic of archive logs.


Question 2

Which two statements about exporting and importing playbacks are true? (Choose two.)



Answer : A, B


Question 3

(In a FortiAnalyzer Fabric deployment, which three modules from Fabric members are available for analysis on the supervisor? (Choose three answers))



Answer : C, D, E

Comprehensive and Detailed Explanation From Exact Extract of knowledge of FortiAnalyzer 7.6 Study guide documents:

The study guide explicitly describes what content from Fabric members is visible/usable on the Fabric supervisor:

Logs: ''In the FortiAnalyzer Fabric supervisor, Log View displays logs collected on all FortiAnalyzer Fabric members.''

Reports: ''For reports, the FortiAnalyzer Fabric supervisor can fetch and aggregate data from multiple members in the FortiAnalyzer Fabric.''

Events: ''Events generated by event handlers on the FortiAnalyzer Fabric members are visible on the supervisor.''

By contrast, the study guide lists a key limitation that rules out Playbooks as a supervisor capability over members: ''You are not able to perform configuration changes or to run automation playbooks from the Fabric supervisor to members.''

Therefore, the three modules available for analysis on the supervisor are Logs, Events, and Reports (C, D, E).


Question 4

As part of your analysis, you discover that an incident is a false positive.

You change the incident status to Closed: False Positive.

Which statement about your update is true?



Answer : A

When an incident in FortiAnalyzer is identified as a false positive and its status is updated to 'Closed: False Positive,' certain records and logs are updated to reflect this change.

Option A - The Audit History Log Will Be Updated:

FortiAnalyzer maintains an audit history log that records changes to incidents, including updates to their status. When an incident status is marked as 'Closed: False Positive,' this action is logged in the audit history to ensure traceability of changes. This log provides accountability and a record of how incidents have been handled over time.

Conclusion: Correct.

Option B - The Corresponding Event Will Be Marked as Mitigated:

Changing an incident to 'Closed: False Positive' does not affect the status of the original event itself. Marking an incident as a false positive signifies that it does not represent a real threat, but it does not imply that the event has been mitigated.

Conclusion: Incorrect.

Option C - The Incident Will Be Deleted:

Marking an incident as 'Closed: False Positive' does not delete the incident from FortiAnalyzer. Instead, it updates the status to reflect that it is not a real threat, allowing for historical analysis and preventing similar false positives in the future. Deletion would typically only occur manually or by a different administrative action.

Conclusion: Incorrect.

Option D - The Incident Number Will Be Changed:

The incident number is a unique identifier and does not change when the status of the incident is updated. This identifier remains constant throughout the incident's lifecycle for tracking and reference purposes.

Conclusion: Incorrect.

Conclusion:

Correct Answe r: A. The audit history log will be updated.

This is the most accurate answer, as the update to 'Closed: False Positive' is recorded in FortiAnalyzer's audit history log for accountability and tracking purposes.


FortiAnalyzer 7.4.1 documentation on incident management and audit history logging.

Question 5

You created a playbook on FortiAnalyzer that uses a FortiOS connector.

When configuring the FortiGate side, which type of trigger must be used so that the actions in an automation stich are available in the FortiOS connector?



Answer : D

When using FortiAnalyzer to create playbooks that interact with FortiOS devices, an Incoming Webhook trigger is required on the FortiGate side to make the actions in an automation stitch accessible through the FortiOS connector. The incoming webhook trigger allows FortiAnalyzer to initiate actions on FortiGate by sending HTTP POST requests to specified endpoints, which in turn trigger automation stitches defined on the FortiGate.

Here's an analysis of each option:

Option A: FortiAnalyzer Event Handler

This is incorrect. The FortiAnalyzer Event Handler is used within FortiAnalyzer itself for handling log events and alerts, but it does not trigger automation stitches on FortiGate.

Option B: Fabric Connector event

This is incorrect. Fabric Connector events are related to Fortinet's Security Fabric integrations but are not specifically used to trigger FortiGate automation stitches from FortiAnalyzer.

Option C: FortiOS Event Log

This is incorrect. While FortiOS event logs can be used for monitoring, they are not designed to trigger automation stitches directly from FortiAnalyzer.

Option D: Incoming webhook

This is correct. The Incoming Webhook trigger on FortiGate enables it to receive requests from FortiAnalyzer, allowing playbooks to activate automation stitches defined on the FortiGate device. This method is commonly used to integrate actions from FortiAnalyzer to FortiGate via the FortiOS connector.


Question 6

Which statement regarding macros on FortiAnalyzer is true?



Answer : B

Macros in FortiAnalyzer are used to streamline reporting tasks by automating data extraction and report generation. Here's a breakdown of each option to determine the correct answer:

Option A - Macros are Predefined Templates for Reports and Cannot be Customized:

This statement is incorrect. Macros in FortiAnalyzer are not simply fixed templates; they allow for customization to tailor data extraction and reporting based on specific needs and configurations.

Conclusion: Incorrect.

Option B - Macros are Useful in Generating Excel Log Files Automatically Based on the Report Settings:

This statement is accurate. Macros in FortiAnalyzer can be configured to automate the generation of reports, including outputting log data to Excel format based on predefined report settings. This makes them especially useful for scheduled reporting and data analysis.

Conclusion: Correct.

Option C - Macros are ADOM-Specific and Each ADOM Type Has Unique Macros Relevant to that ADOM:

Macros are not limited to specific ADOMs, nor are they ADOM-specific. Macros can be applied across various ADOMs based on report configurations but are not inherently tied to or unique for each ADOM type.

Conclusion: Incorrect.

Option D - Macros are Supported Only on the FortiGate ADOMs:

This is not true. Macros in FortiAnalyzer are not restricted to FortiGate ADOMs; they can be utilized across different ADOMs that FortiAnalyzer manages.

Conclusion: Incorrect.

Conclusion:

Correct Answe r: B. Macros are useful in generating excel log files automatically based on the report settings.

This answer correctly describes the functionality of macros in FortiAnalyzer, emphasizing their role in automating report generation, especially for Excel log files.


FortiAnalyzer 7.4.1 documentation on macros and report generation functionalities.

Question 7

Which two actions should an administrator take to vide Compromised Hosts on FortiAnalyzer? (Choose two.)



Answer : A, B

To view Compromised Hosts on FortiAnalyzer, certain configurations need to be in place on both FortiGate and FortiAnalyzer. Compromised Host data on FortiAnalyzer relies on log information from FortiGate to analyze threats and compromised activities effectively. Here's why the selected answers are correct:

Option A: Enable device detection on the FortiGate devices that are sending logs to FortiAnalyzer

Enabling device detection on FortiGate allows it to recognize and log devices within the network, sending critical information about hosts that could be compromised. This is essential because FortiAnalyzer relies on these logs to determine which hosts may be at risk based on suspicious activities observed by FortiGate. This setting enables FortiGate to provide device-level insights, which FortiAnalyzer uses to populate the Compromised Hosts view.

Option B: Enable web filtering in firewall policies on FortiGate devices, and make sure these logs are sent to FortiAnalyzer

Web filtering is crucial in identifying potentially compromised hosts since it logs any access to malicious sites or blocked categories. FortiAnalyzer uses these web filter logs to detect suspicious or malicious web activity, which can indicate compromised hosts. By ensuring that FortiGate sends these web filtering logs to FortiAnalyzer, the administrator enables FortiAnalyzer to analyze and identify hosts engaging in risky behavior.

Let's review the other options for clarity:

Option C: Make sure all endpoints are reachable by FortiAnalyzer

This is incorrect. FortiAnalyzer does not need direct access to all endpoints. Instead, it collects data indirectly from FortiGate logs. FortiGate devices are the ones that interact with endpoints and then forward relevant logs to FortiAnalyzer for analysis.

Option D: Subscribe FortiAnalyzer to FortiGuard to keep its local threat database up to date

Although subscribing to FortiGuard helps keep threat intelligence updated, it is not a requirement specifically to view compromised hosts. FortiAnalyzer primarily uses logs from FortiGate (such as web filtering and device detection) to detect compromised hosts.


Page:    1 / 14   
Total 66 questions