Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

FCSS_ADA_AR-6.7 Exam Dumps - FCSS Advanced Analytics 6.7 Architect

Go to page:
Question # 9

Refer to the exhibit.

Consider the five account locked events received by FortiSIEM from domain controllers within the last 10 minutes (ten minutes is the evaluation window for the subpattern DomainAcctLockout):

If you look for one or more matching events and groupings by the same reporting IP address, reporting device, and user, how many incidents are created?

A.

3

B.

4

C.

2

D.

1

Full Access
Question # 10

Which lookup table function can be either true or false?

A.

LookupTableHas

B.

LookupTableGet

C.

LookupTableFilter

D.

LookupTableRetriev

Full Access
Question # 11

In the event of a WAN link failure between the collector and the supervisor, by default, what is the maximum number of event files stored on the collector?

A.

20,000

B.

10,000

C.

40,000

D.

30,000

Full Access
Question # 12

Refer to the exhibit.

The window for this rule is 30 minutes.

What is this rule tracking?

A.

A sudden 50% increase in WMI response times over a 30-minute time window

B.

A sudden 1.50 times increase in WMI response times over a 30-minute time window

C.

A sudden 150% increase in WMI response times over a 30-minute time window

D.

A sudden 75% increase in WMI response times over a 30-minute time window

Full Access
Question # 13

Refer to the exhibit.

A service provider does not have a dedicated worker in the cluster, but still wants to add a collector to an organization.

What option does the administrator have?

A.

Define a pseudo address as a worker IP address

B.

Install a worker

C.

Ignore the warning and continue adding the collector

D.

Define the supervisorIP address as a worker unload address

Full Access
Question # 14

Refer to the exhibit.

Which deployment type is shown in the exhibit?

A.

Service provider with collectors

B.

Service provider without collectors

C.

Hybrid deployment with and without collectors

D.

Enterprise cloud deployment

Full Access
Question # 15

Refer to the exhibit.

Why was this incident auto cleared?

A.

Within five minutes, the packet loss percentage dropped to a level where the host IP of the original rule matches the host IP of the clear condition pattern

B.

Within five minutes the packet loss percentage dropped to a level where the reporting IP is the same as the host IP

C.

The original rule did not trigger within five minutes

D.

Within five minutes, the packet loss percentage dropped to a level where the reporting IP is same as the source IP

Full Access
Question # 16

Refer to the exhibit.

Consider a custom lookup tableMalwareIPList. An analyst constructed an analytic query to reference theMalwareIPListlookup table.

What is the outcome of the analytic query?

A.

The IP address from permitted traffic with a confidence score of 98 is displayed.

B.

The analyst receives an error because the LookupTableGet function can be used only in display filters to enrich data.

C.

The value for the LookupTableGet function in the analytic search can be either true or false.

D.

The permitted traffic IP address from the Phishing category is displayed.

Full Access
Go to page: