11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

FCP_FAZ_AN-7.4 Exam Dumps - FCP - FortiAnalyzer 7.4 Analyst

Question # 4

Exhibit.

Which statement about the event displayed is correct?

A.

The risk source is isolated.

B.

The security risk was blocked or dropped.

C.

The security event risk is considered open.

D.

An incident was created from this event.

Full Access
Question # 5

Which FortiAnalyzer feature allows you to use a proactive approach when managing your network security?

A.

FortiView Monitor

B.

Outbreak alert services

C.

Incidents dashboard

D.

Threat hunting

Full Access
Question # 6

Refer to Exhibit:

Client-1 is trying to access the internet for web browsing.

All FortiGate devices in the topology are part of a Security Fabric with logging to FortiAnalyzer configured. All firewall policies have logging enabled. All web filter profiles are configured to log only violations.

Which statement about the logging behavior for this specific traffic flow is true?

A.

Only FGT-B will create traffic logs.

B.

FGT-B will see the MAC address of FGT-A as the destination and notifies FGT-A to log this flow.

C.

FGT B will create traffic logs and will create web filter logs if it detects a violation.

D.

Only FGT-A will create web filter logs if it detects a violation.

Full Access
Question # 7

Which two statements regarding FortiAnalyzer operating modes are true? (Choose two.)

A.

When running in collector mode, FortiAnalyzer can forward logs to a syslog server.

B.

FortiAnalyzer runs in collector mode by default unless it is configured for HA.

C.

You can create and edit reports when FortiAnalyzer is running in collector mode.

D.

A topology with FortiAnalyzeer devices running in both modes can improve their performance.

Full Access
Question # 8

Exhibit.

What can you conclude about these search results? (Choose two.)

A.

They can be downloaded to a file.

B.

They are sortable by columns and customizable.

C.

They are not available for analysisin FortiView.

D.

They were searched by using text mode.

Full Access
Question # 9

Which statement about the FortiSOAR management extension is correct?

A.

It requires a FortiManager configured to manage FortiGate.

B.

It runs as a docker container on FortiAnalyzer.

C.

It requires a dedicated FortiSOAR device or VM.

D.

It does not include a limited trial by default.

Full Access
Question # 10

Exhibit.

What can you conclude from this output?

A.

There is not disk quota allocated to quarantining files.

B.

FGT_B is the Security Fabric root.

C.

The allocated disk quote to ADOM1 is 3 GB.

D.

Archive logs are using more space than analytic logs.

Full Access