Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Fortinet FCSS_ADA_AR-6.7 Dumps Questions Answers

FCSS Advanced Analytics 6.7 Architect Questions and Answers

Question 1

Where are the SQLite databases that are used for the baselining, stored?

Options:

A.

/opt/phoenix/cache

B.

/opt/phoenix/bin

C.

/opt/phoenix/config

D.

/opt/phoenix/delta

Buy Now
Question 2

Refer to the exhibit.

Within what time window is the incident auto cleared?

Options:

A.

1800 seconds

B.

Null

C.

1 day

D.

30 minutes

Question 3

Which syntax will register a collector to the supervisor?

Options:

A.

phProvisionCollector -add

B.

phProvisionCollector -add

C.

phProvisionCollector -add

D.

phProvisionCollector -add

Question 4

What is the hourly bucket used in baselining?

Options:

A.

To store hourly baselines reports for every hour of the day during weekdays and weekends

B.

To store data for specific baselines during the weekend, if there is a spike in network activity

C.

To store data for specific baselines during peak business hours of weekdays

D.

To store data for specific baselines for every hour of the day during weekdays and weekends

Question 5

A service provider purchased a 500-EPS license and configured a new collector with 100 EPS for customer A, and another collector with 200 EPS for customer B.

How much is in the remaining EPS pool for future customers and for MSSP itself?

Options:

A.

30

B.

200

C.

100

D.

50

Question 6

Which statement accurately contrasts lookup tables with watchlists?

Options:

A.

Lookup table values age out after a period, whereas watchlist values do not have any time condition.

B.

You can populate lookup tables through an incident, whereas you cannot populate watchlists through an incident.

C.

Lookup tables can contain multiple columns, whereas watchlists contain only a single column.

D.

You can reference lookup table data in analytic queries and reports almost immediately, whereas you may have to wait up to 5-10 minutes for watchlist entries to be useable in queries and reports.

Question 7

Refer to the exhibit.

Which statement about the rule filters events shown in the exhibit is true?

Options:

A.

The rule filters events with an event type that equals Domain Account Locked and a reporting IP that equals Domain Controller applications.

B.

The rule filters events with an event type that belong to the Domain Account Locked CMDB group or a reporting IP that belong to the Domain Controller applications group.

C.

The rule filters events with an event type that belong to the Domain Account Locked CMDB group and a reporting IP that belong to the Domain Controller applications group.

D.

The rule filters events with an event type that belong to the Domain Account Locked CMDB group and a user that belongs to the Domain Controller applications group.

Question 8

Refer to the exhibit.

What are three possible reasons why theAgent StatusdisplaysRunning Inactive? (Choose three.)

Options:

A.

The agent was registered incorrectly

B.

The collector was not assigned to the agent

C.

The agent is temporarily down

D.

The template was not assigned

E.

The template was removed

Question 9

Refer to the exhibit.

The rule evaluates multiple VPN logon failures within a ten-minute window. Consider the following VPN failure events received within a ten-minute window:

How many incidents are generated?

Options:

A.

1

B.

2

C.

0

D.

3

Question 10

Refer to the exhibit.

Which devices will be added to the CMDB and mapped to Customer E?

Options:

A.

10.50.0.150

B.

10.50.0.1

C.

10.60.0.1

D.

10.50.0.149

Question 11

In a customer network that includes a collector, which device performs device discoveries?

Options:

A.

Agent

B.

Supervisor

C.

Worker

D.

Collector

Question 12

Why do collectors communicate with the Supervisor after registration? (Choose two.)

Options:

A.

To receive templates associated with agents

B.

To report the health status of the agents

C.

To upload event data if a worker down

D.

To report its own health status

Question 13

Refer to the exhibit.

The service provider deployed FortiSIEM without a collector and added three customers on the supervisor.

What mistake did the administrator make?

Options:

A.

The number of workers on the FortiSIEM cluster must match the number of customers added

B.

Collectors must be deployed on all customer premises before they are added to organization on the supervisor.

C.

At least one collector must be deployed to collect logs from service provider infrastructure devices.

D.

Customer A and customer B have overlapping IP addresses.

Question 14

Refer to the exhibit.

Which three fields from the organization destination are required while registering a collector? (Choose three.)

Options:

A.

Account Number

B.

Admin Password

C.

Agent Password

D.

Organization

E.

Admin User

Question 15

Refer to the exhibit.

This is an example of a baseline profile that is configured in the backend of FortiSIEM.

Which two Group By attributes are configured for this profile? (Choose two.)

Options:

A.

Logon Failure

B.

Reporting Device

C.

Reporting IP

D.

Distinct User

Question 16

Which three processes are collector processes? (Choose three.)

Options:

A.

phParser

B.

phAgentManager

C.

phMonitorAgent

D.

phReportMaster

E.

phRuleMaster

Question 17

Which two statements about the maximum device limit on FortiSIEM are true? (Choose two.)

Options:

A.

The device limit is based on the license type that was purchased from Fortinet.

B.

The device limit is defined per customer and every customer is assigned a fixed number of device limit by the service provider.

C.

The device limit is only applicable to enterprise edition.

D.

The device limit is defined for the whole system and is shared by every customer on a service provider edition.