Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the purpose of trigger variables?

A.

To display statistics about the playbook runtime

B.

To use information from the trigger to filter the action in a task

C.

To provide the trigger information to make the playbook start running

D.

To store the start times of playbooks with On_Schedule triggers

A playbook contains five tasks in total. An administrator runs the playbook and four out of five tasks finish successfully, but one task fails. What will be the status of the playbook after it is run?

A.

Running

B.

Failed

C.

Upstream_failed

D.

Success

An administrator, fortinet, can view logs and perform device management tasks, such as adding and removing registered devices. However, administrator fortinet is not able to create a mail server that can be used to send alert emails.

What can be the problem?

A.

ADOM mode is configured with Advanced mode.

B.

A trusted host is configured.

C.

fortinet is assigned the default Standard_User administrative profile.

D.

fortinet is assigned the default Restricted_User administrative profile.

Which two statements about creating ADOMs are true1? (Choose two.)

A.

An administrator with the default standard_User profile can create ADOMs.

B.

Disk quotas can be defined per device inside the ADOM.

C.

FortiAnalyzer creates default ADOMs when ADOMs are enabled.

D.

The ADOM type you create must match the device type you are planning to add.

Which two settings must you configure on FortiAnalyzer to allow non-local administrators to authenticate on FortiAnalyzer with any user account in a single LDAP group? (Choose two.)

A.

A local wildcard administrator account

B.

An administrator group

C.

One or more remote LDAP servers

D.

LDAP servers IP addresses added as trusted hosts

Which daemon is responsible for enforcing the log file size?

A.

sqlplugind

B.

logfiled

C.

miglogd

D.

ofrpd

What is required to authorize a FortiGate on FortiAnalyzer using Fabric authorization?

A.

A FortiGate ADOM

B.

The FortiGate serial number

C.

A pre-shared key

D.

Valid FortiAnalyzer credentials

Refer to the exhibit.

What does the data point at 14:55 tell you?

A.

The received rate is almost at its maximum for this device

B.

The sqlplugind daemon is behind in log indexing by two logs

C.

Logs are being dropped

D.

Raw logs are reaching FortiAnalyzer faster than they can be indexed

Which log type does the FortiAnalyzer indicators of compromise feature use to identify infected hosts?

A.

Antivirus logs

B.

Web filter logs

C.

IPS logs

D.

Application control logs

Refer to the exhibit.

What is the purpose of using the Chart Builder feature on FortiAnalyzer?

A.

To add a new chart under FortiView to be used in new reports

B.

To build a dataset and chart automatically, based on the filtered search results

C.

To add charts directly to generate reports in the current ADOM

D.

To build a chart automatically based on the top 100 log entries