Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What are the modes of Data Ingestion on FortiSOAR? (Choose three.)

A.

Policy based

B.

Rule based

C.

App Push

D.

Schedule based

E.

Notification based

Refer to the exhibit.

Is the Windows agent delivering event logs correctly?

A.

The agent is registered and it is sending logs correctly.

B.

The logs are buffered by the agent and will be sent once the status changes to managed.

C.

Because the agent is unmanaged. the logs are dropped silently by the supervisor.

D.

The agent is not sending logs because it did not receive a monitoring template.

Refer to the exhibit.

The service provider deployed FortiSIEM without a collector and added three customers on the supervisor.

What mistake did the administrator make?

A.

The number of workers on the FortiSIEM cluster must match the number of customers added

B.

Collectors must be deployed on all customer premises before they are added to organization on the supervisor.

C.

At least one collector must be deployed to collect logs from service provider infrastructure devices.

D.

Customer A and customer B have overlapping IP addresses.

Which three statements about phRuleMaster are true? (Choose three.)

A.

phRuleMaster is present on the supervisor only.

B.

phRuleMaster is present on the supervisor and workers.

C.

phRuleMaster queues up the data being received from the phRuleWorkers into buckets.

D.

phRuleMaster wakes up to evaluate all the rule data in parallel, every 30 seconds.

E.

phRuleMaster wakes up to evaluate all the rule data in series, every 30 seconds.

Refer to the exhibit.

What are three possible reasons why theAgent StatusdisplaysRunning Inactive? (Choose three.)

A.

The agent was registered incorrectly

B.

The collector was not assigned to the agent

C.

The agent is temporarily down

D.

The template was not assigned

E.

The template was removed

Refer to the exhibit.

Consider a custom lookup tableMalwareIPList. An analyst constructed an analytic query to reference theMalwareIPListlookup table.

What is the outcome of the analytic query?

A.

The IP address from permitted traffic with a confidence score of 98 is displayed.

B.

The analyst receives an error because the LookupTableGet function can be used only in display filters to enrich data.

C.

The value for the LookupTableGet function in the analytic search can be either true or false.

D.

The permitted traffic IP address from the Phishing category is displayed.

Refer to the exhibit.

Which workers are assigned tasks for the query ID13127? (Choose two.)

A.

Worker1 has no tasks for query ID 13127*.

B.

Worker1 has one task for query ID 13127*.

C.

Worker2 has two tasks for query ID 13127*.

D.

Worker3 has four tasks for query ID 13127*.

E.

Worker3 has two tasks for query ID 13127*.

Why do collectors communicate with the Supervisor after registration? (Choose two.)

A.

To receive templates associated with agents

B.

To report the health status of the agents

C.

To upload event data if a worker down

D.

To report its own health status

Refer to the exhibit.

An administrator runs an analytic search for all FortiGate SSL VPN logon failures. The results are grouped by source IP, reporting IP, and user. The administrator wants to restrict the results to only those rows where the COUNT >=3.

Which user would meet that condition?

A.

Jan

B.

Sarah

C.

Admin

D.

Tom

How can you customize the AI model on FortiSIEM?

A.

Retrain the AI model

B.

Reconfigure UEBA rules

C.

Adjust risk weighting for UEBA tags

D.

Adjust number of samples collected by the UEBA agents