Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two ports must be open between FortiSOAR HA nodes'* (Choose two.)

A.

Port 5432

B.

Port 25

C.

Port 6380

D.

Port 9200

A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)

A.

Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.

B.

View the user's effective role permissions, and then investigate which role is providing that access.

C.

Remove all record ownership that is assigned to the user.

D.

Review the user's learn hierarchy to ensure that the appropriate relationships are configured.

Refer to the exhibit.

Which two statements about the recommendation engine are true? (Choose two.)

A.

There are no playbooks that can be run on the recommended alerts using the recommendation panel

B.

The dataset is trained to predict the Severity and Type fields.

C.

The recommendation engine is set to automatically accept suggestions.

D.

The alert severity is High, but the recommendation is for it to be set to Medium