For which two purposes would you use the command set log checksum? (Choose two.)
For which two purposes would you use the command set log checksum? (Choose two.)A . To help protect against man-in-the-middle attacks during log upload from FortiAnalyzer to an SFTP serverB . To prevent log modification or tamperingC . To encrypt log communicationsD . To send an identical set of logs...
If a hard disk fails on a FortiAnalyzer that supports software RAID, what should you do to bring the FortiAnalyzer back to functioning normally, without losing data?
If a hard disk fails on a FortiAnalyzer that supports software RAID, what should you do to bring the FortiAnalyzer back to functioning normally, without losing data?A . Hot swap the diskB . Replace the disk and rebuild the RAID manuallyC . Take no action if the RAID level supports...
Which two methods are the most common methods to control and restrict administrative access on FortiAnalyzer? (Choose two.)
Which two methods are the most common methods to control and restrict administrative access on FortiAnalyzer? (Choose two.)A . Virtual domainsB . Administrative access profilesC . Trusted hostsD . Security FabricView AnswerAnswer: BC Explanation: Reference: https://docs2.fortinet.com/document/fortianalyzer/6.0.0/administration-guide/219292/administrator-profiles https://docs2.fortinet.com/document/fortianalyzer/6.0.0/administration-guide/581222/trusted-hosts
If you upgrade the FortiAnalyzer firmware, which report element can be affected?
If you upgrade the FortiAnalyzer firmware, which report element can be affected?A . Custom datasetsB . Report schedulingC . Report settingsD . Output profilesView AnswerAnswer: A Explanation: https://docs.fortinet.com/document/fortianalyzer/6.2.5/upgrade-guide/669300/checking-reports
How can you configure FortiAnalyzer to permit administrator logins from only specific locations?
How can you configure FortiAnalyzer to permit administrator logins from only specific locations?A . Use static routesB . Use administrative profilesC . Use trusted hostsD . Use secure protocolsView AnswerAnswer: C Explanation: https://docs.fortinet.com/document/fortianalyzer/6.2.5/administration-guide/186508/trusted-hosts
Which two constraints can impact the amount of reserved disk space required by FortiAnalyzer? (Choose two.)
Which two constraints can impact the amount of reserved disk space required by FortiAnalyzer? (Choose two.)A . License typeB . Disk sizeC . Total quotaD . RAID levelView AnswerAnswer: B, D Explanation: https://docs.fortinet.com/document/fortianalyzer/6.2.5/administration-guide/368682/disk-space-allocation
Which FortiAnalyzer feature allows you to retrieve the archived logs matching a specific timeframe from another FortiAnalyzer device?
Which FortiAnalyzer feature allows you to retrieve the archived logs matching a specific timeframe from another FortiAnalyzer device?A . Log uploadB . Indicators of CompromiseC . Log forwarding an aggregation modeD . Log fetchingView AnswerAnswer: D Explanation: https://docs.fortinet.com/document/fortianalyzer/6.2.0/administration-guide/651442/fetcher-management
What is the recommended method to replace the disk?
You are using RAID with a FortiAnalyzer that supports software RAID, and one of the hard disks on FortiAnalyzer has failed. What is the recommended method to replace the disk?A . Shut down FortiAnalyzer and then replace the diskB . Downgrade your RAID level, replace the disk, and then upgrade...
When you perform a system backup, what does the backup configuration contain? (Choose two.)
When you perform a system backup, what does the backup configuration contain? (Choose two.)A . Generated reportsB . Device listC . Authorized devices logsD . System informationView AnswerAnswer: B, D Explanation: https://help.fortinet.com/fa/cli-olh/5-6-5/Content/Document/1400_execute/backup.htm Reference: https://help.fortinet.com/fauth/5-2/Content/Admin%20Guides/5_2%20Admin%20Guide/300/301_Dashboard.htm
What is the significance of executing this command?
An administrator has configured the following settings: config system global set log-checksum md5-auth end What is the significance of executing this command?A . This command records the log file MD5 hash value.B . This command records passwords in log files and encrypts them.C . This command encrypts log transfer between...