New Year Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet NSE7_SOC_AR-7.6 Fortinet NSE 7 - Security Operations 7.6 Architect Exam Practice Test

Fortinet NSE 7 - Security Operations 7.6 Architect Questions and Answers

Question 1

When you use a manual trigger to save user input as a variable, what is the correct Jinja expression to reference the variable? (Choose one answer)

Options:

A.

{{ vars.input.params. }}

B.

{{ globalVars. }}

C.

{{ vars.item. }}

D.

{{ vars.steps. }}

Question 2

Refer to the exhibits.

The Malicious File Detect playbook is configured to create an incident when an event handler generates a malicious file detection event.

Why did the Malicious File Detect playbook execution fail?

Options:

A.

The Create Incident task was expecting a name or number as input, but received an incorrect data format

B.

The Get Events task did not retrieve any event data.

C.

The Attach_Data_To_lncident incident task wasexpecting an integer, but received an incorrect data format.

D.

The Attach Data To Incident task failed, which stopped the playbook execution.

Question 3

Refer to the exhibit.

Which two options describe how the Update Asset and Identity Database playbook is configured? (Choose two.)

Options:

A.

The playbook is using a local connector.

B.

The playbook is using a FortiMail connector.

C.

The playbook is using an on-demand trigger.

D.

The playbook is using a FortiClient EMS connector.

Question 4

A customer wants FortiAnalyzer to run an automation stitch that executes a CLI command on FortiGate to block a predefined list of URLs, if a botnet command-and-control (C&C) server IP is detected.

Which FortiAnalyzer feature must you use to start this automation process?

Options:

A.

Playbook

B.

Data selector

C.

Event handler

D.

Connector

Question 5

Your company is doing a security audit To pass the audit, you must take an inventory of all software and applications running on all Windows devices

Which FortiAnalyzer connector must you use?

Options:

A.

FortiClient EMS

B.

ServiceNow

C.

FortiCASB

D.

Local Host

Question 6

Match the FortiSIEM device type to its description. Select each FortiSIEM device type in the left column, hold and drag it to the blank space next to its corresponding description in the column on the right.

Question # 6

Options:

Question 7

Refer to the exhibits.

Question # 7

How is the investigation and remediation output generated on FortiSIEM? (Choose one answer)

Options:

A.

By exporting an incident

B.

By running an incident report

C.

By using FortiAI to summarize the incident

D.

By viewing the Context tab of an incident

Question 8

What are three capabilities of the built-in FortiSOAR Jinja editor? (Choose three answers)

Options:

A.

It renders output by combining Jinja expressions and JSON input.

B.

It checks the validity of a Jinja expression.

C.

It creates new records in bulk.

D.

It loads the environment JSON of a recently executed playbook.

E.

It defines conditions to trigger a playbook step.

Question 9

Review the following incident report:

Attackers leveraged a phishing email campaign targeting your employees.

The email likely impersonated a trusted source, such as the IT department, and requested login credentials.

An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).

The RAT provided the attackers with remote access and a foothold in the compromised system.

Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)

Options:

A.

Initial Access

B.

Defense Evasion

C.

Lateral Movement

D.

Persistence

Question 10

Which two ways can you create an incident on FortiAnalyzer? (Choose two.)

Options:

A.

Using a connector action

B.

Manually, on the Event Monitor page

C.

By running a playbook

D.

Using a custom event handler

Question 11

Which role does a threat hunter play within a SOC?

Options:

A.

investigate and respond to a reported security incident

B.

Collect evidence and determine the impact of a suspected attack

C.

Search for hidden threats inside a network which may have eluded detection

D.

Monitor network logs to identify anomalous behavior

Question 12

Refer to the exhibits.

You configured a custom event handler and an associated rule to generate events whenever FortiMail detects spam emails. However, you notice that the event handler is generating events for both spam emails and clean emails.

Which change must you make in the rule so that it detects only spam emails?

Options:

A.

In the Log Type field, select Anti-Spam Log (spam)

B.

In the Log filter by Text field, type type==spam.

C.

Disable the rule to use the filter in the data selector to create the event.

D.

In the Trigger an event when field, select Within a group, the log field Spam Name (snane) has 2 or more unique values.

Question 13

You are trying to create a playbook that creates a manual task showing a list of public IPv6 addresses. You were successful in extracting all IP addresses from a previous action into a variable calledip_list, which contains both private and public IPv4 and IPv6 addresses. You must now filter the results to display only public IPv6 addresses. Which two Jinja expressions can accomplish this task? (Choose two answers)

Options:

A.

{{ vars.ip_list | ipv6addr('public') }}

B.

{{ vars.ip_list | ipaddr('public') | ipv6 }}

C.

{{ vars.ip_list | ipaddr('!private') | ipv6 }}

D.

{{ vars.ip_list | ipv6 | ipaddr('public') }}

Question 14

Which two statements about the FortiAnalyzer Fabric topology are true? (Choose two.)

Options:

A.

Downstream collectors can forward logs to Fabric members.

B.

Logging devices must be registered to the supervisor.

C.

The supervisor uses an API to store logs, incidents, and events locally.

D.

Fabric members must be in analyzer mode.

Question 15

Refer to the exhibits.

What can you conclude from analyzing the data using the threat hunting module?

Options:

A.

Spearphishing is being used to elicit sensitive information.

B.

DNS tunneling is being used to extract confidential data from the local network.

C.

Reconnaissance is being used to gather victim identity information from the mail server.

D.

FTP is being used as command-and-control (C&C) technique to mine for data.

Question 16

Which three end user logs does FortiAnalyzer use to identify possible IOC compromised hosts? (Choose three answers)

Options:

A.

Web filter logs1

B.

Email filter logs

C.

DNS filter logs2

D.

Application filter logs

E.

IPS logs

Question 17

Which statement describes automation stitch integration between FortiGate and FortiAnalyzer?

Options:

A.

An event handler on FortiAnalyzer executes an automation stitch when an event is created.

B.

An automation stitch is configured on FortiAnalyzer and mapped to FortiGate using the FortiOS connector.

C.

An event handler on FortiAnalyzer is configured to send a notification to FortiGate to trigger an automation stitch.

D.

A security profile on FortiGate triggers a violation and FortiGate sends a webhook call to FortiAnalyzer.