Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Fortinet NSE5_FSM-6.3 Dumps

Fortinet NSE 5 - FortiSIEM 6.3 Questions and Answers

Question 1

Refer to the exhibit.

as

Which section contains the sortings that determine how many incidents are created?

Options:

A.

Actions

B.

Group By

C.

Aggregate

D.

Filters

Question 2

A customer is experiencing slow performance while executing long, adhoc analytic searches Which FortiSIEM component can make the searches run faster?

Options:

A.

Correlation worker

B.

Event worker

C.

Storage worker

D.

Query worker

Question 3

How is a subpattern for a rule defined?

Options:

A.

Filters, Aggregation, Group by definitions

B.

Filters, Group By definitions, Threshold

C.

Filters, Threshold, Time Window definitions

D.

Filters, Aggregation, Time Window definitions

Question 4

In the advanced analytical rules engine in FortiSIEM, multiple subpatterms can be referenced using which three operation?(Choose three.)

Options:

A.

ELSE

B.

NOT

C.

FOLLOWED_BY

D.

OR

E.

AND

Question 5

Refer to the exhibit.

as

Which value will FortiSIEM use to populate the Event Type field?

Options:

A.

PHL_INFO

B.

phPerfJob

C.

PH_DSV_MON_SYS_DISK_UTIL

D.

diskUtil

Question 6

Refer to the exhibit.

as

The FortiSIEM administrator is examining events for two devices to investigate an issue. However, the administrator is not getting any results from their search.

Based on the selected filters shown in the exhibit, why is the search returning no results?

Options:

A.

Parenthesis are missing.

B.

The wrong boolean operator is selected in the Next column.

C.

The wrong option is selected in the Operator column.

D.

An invalid IP subnet is typed in the Value column.

Question 7

If a performance rule is triggered repeatedly due to high CPU use, what occurs in the incident table?

Options:

A.

A now incident is created each time the rule is triggered. and the First Seen and Last Seen times are updated.

B.

A new incident is created based on the Rule Frequency value, and the First Seen and Last Seen times ate updated.

C.

The Incident Count value increases, and the First Seen and Last Seen times update.

D.

The incident status changes to Repeated, and the First Seen and Last Seen times are updated.

Question 8

Device discovery information is stored in which database?

Options:

A.

CMDB

B.

Profile DB

C.

Event DB

D.

SVN DB

Question 9

Refer to the exhibit.

as

If events are grouped by User. Source IP. and Application Category attributes in FortiSiEM. how many results will be displayed?

Options:

A.

Three results will be displayed.

B.

Five results will be displayed.

C.

No results will be displayed.

D.

Seven results will be displayed.

Question 10

An administrator wants to search for events received from Linux and Windows agents.

Which attribute should the administrator use in search filters, to view events received from agents only.

Options:

A.

External Event Receive Protocol

B.

Event Received Proto Agents

C.

External Event Receive Raw Logs

D.

External Event Receive Agents

Question 11

What does the Frequency field determine on a rule?

Options:

A.

How often the rule will evaluate the subpattern.

B.

How often the rule will trigger for the same condition.

C.

How often the rule will trigger.

D.

How often the rule will take a clear action.

Question 12

In me FortiSIEM CLI. which command must you use to determine whether or not syslog is being received from a network device?

Options:

A.

tcpdump

B.

OphSyslogRecorder

C.

Onetcat

D.

phDeviceTest

Question 13

Which database is used for storing anomaly data, that is calculated for different parameters, such as traffic and device resource usage running averages, and standard deviation values?

Options:

A.

Profile DB

B.

Event DB

C.

CMDB

D.

SVN DB

Question 14

What are the four categories of incidents?

Options:

A.

Devices, users, high risk, and low risk

B.

Performance, devices, high risk, and low risk

C.

Performance, availability, security, and change

D.

Security, change, high risk, and low risk

Question 15

Which is a requirement for implementing FortiSIEM disaster recovery?

Options:

A.

All worker nodes must access both supervisor nodes using IP.

B.

SNMP, and WMI ports must be open between the two supervisor nodes.

C.

The two supervisor nodes must have layer 2 connectivity.

D.

DNS names must be used for the worker upload addresses.

Page: 1 / 5
Total 50 questions