For two-factor authentication (2FA) via SMS, FortiSOAR supports integration with Telesign. This vendor provides SMS-based 2FA services, enabling FortiSOAR to leverage Telesign's API for sending verification codes as part of its security features. Telesign’s service is compatible with FortiSOAR, ensuring secure user authentication when accessing the platform or certain features​.
Question # 10
Refer to the exhibit.
Which two statements about the recommendation engine are true? (Choose two.)
A.
There are no playbooks that can be run on the recommended alerts using the recommendation panel
B.
The dataset is trained to predict the Severity and Type fields.
C.
The recommendation engine is set to automatically accept suggestions.
D.
The alert severity is High, but the recommendation is for it to be set to Medium
The Recommendation Engine in FortiSOAR is designed to assist in alert triage by suggesting values for certain fields based on historical data and machine learning models. In this case, the engine is trained to predict both the Severity and Type fields, suggesting values that align with past incidents and threat intelligence. Although the current alert severity is High, the recommendation engine has suggested adjusting it to Medium based on the pattern of similar past alerts, indicating a less critical threat level than initially perceived. This functionality helps analysts by providing data-driven insights, which can optimize alert handling and resource allocation​.
Question # 11
On FortiSOAR. which default role is used to assign privileges to other teams and is recommended to not be removed?
In FortiSOAR, the "Application Administrator" role is a default role that holds broad privileges, including the ability to assign permissions to other teams. This role is fundamental to system administration and is recommended not to be removed as it provides crucial administrative capabilities. Removing or modifying this role could impact FortiSOAR's ability to manage user roles and permissions effectively, which could hinder system operations and user management​.