New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

FCP_FAZ_AD-7.4 Exam Dumps - FCP - FortiAnalyzer 7.4 Administrator

Go to page:
Question # 25

Refer to the exhibit.

What is the purpose of using the Chart Builder feature on FortiAnalyzer?

A.

To add a new chart under FortiView to be used in new reports

B.

To build a dataset and chart automatically, based on the filtered search results

C.

To add charts directly to generate reports in the current ADOM

D.

To build a chart automatically based on the top 100 log entries

Full Access
Question # 26

Which FortiAnalyzer feature allows you to retrieve the archived logs matching a specific timeframe from

another FortiAnalyzer device?

A.

Log upload

B.

Indicators of Compromise

C.

Log forwarding an aggregation mode

D.

Log fetching

Full Access
Question # 27

For which two purposes would you use the command set log checksum? (Choose two.)

A.

To help protect against man-in-the-middle attacks during log upload from FortiAnalyzer to an SFTP server

B.

To prevent log modification or tampering

C.

To encrypt log communications

D.

To send an identical set of logs to a second logging server

Full Access
Question # 28

How are logs forwarded when FortiAnalyzer is using aggregation mode?

A.

Logs are forwarded as they are received and content files are uploaded at a scheduled time.

B.

Logs and content files are stored and uploaded at a scheduled time.

C.

Logs are forwarded as they are received.

D.

Logs and content files are forwarded as they are received.

Full Access
Question # 29

Which two elements are contained in a system backup created on FortiAnalyzer? (Choose two.)

A.

Logs from registered devices

B.

Database snapshot

C.

Report information

D.

System information

Full Access
Question # 30

Which statement about the FortiSIEM management extension is correct?

A.

Allows you to manage the entire life cycle of a threat or breach.

B.

Its use of the available disk space is capped at 50%.

C.

It requires a licensed FortiSIEM supervisor.

D.

It can be installed as a dedicated VM.

Full Access
Question # 31

Which two actions should an administrator take to view Compromised Hosts on FortiAnalyzer? (Choose two.)

A.

Enable web filtering in firewall policies on FortiGate devices, and make sure these logs are sent to FortiAnalyzer.

B.

Make sure all endpoints are reachable by FortiAnalyzer.

C.

Enable device detection on an interface on the FortiGate devices that are connected to the FortiAnalyzer device.

D.

Subscribe FortiAnalyzer to FortiGuard to keep its local threat database up to date.

Full Access
Question # 32

Why should you use an NTP server on FortiAnalyzer and all registered devices that log into FortiAnalyzer?

A.

To properly correlate logs

B.

To use real-time forwarding

C.

To resolve host names

D.

To improve DNS response times

Full Access
Go to page: