What is the purpose of output variables?

What is the purpose of output variables?A . To store playbook execution statisticsB . To use the output of the previous task as the input of the current taskC . To display details of the connectors used by a playbookD . To save all the task settings when a playbook...

February 9, 2025 No Comments READ MORE +

When you move a FortiGate device from one ADOM to a new ADOM, what is the purpose of rebuilding the new ADOM database?

When you move a FortiGate device from one ADOM to a new ADOM, what is the purpose of rebuilding the new ADOM database?A . To migrate the archive logs to the new ADOMB . To reset the disk quota enforcement to defaultC . To remove the device's analytics logs from...

February 5, 2025 No Comments READ MORE +

In order for FortiAnalyzer to collect logs from a FortiGate device, what configuration is required? (Choose two.)

In order for FortiAnalyzer to collect logs from a FortiGate device, what configuration is required? (Choose two.)A . Remote logging must be enabled on FortiGateB . FortiGate must be registered with FortiAnalyzerC . Log encryption must be enabledD . ADOMs must be enabledView AnswerAnswer: AB

February 4, 2025 No Comments READ MORE +

What must you consider when using log fetching? (Choose two.)

What must you consider when using log fetching? (Choose two.)A . The fetch client can retrieve logs from devices that are not added to its local Device Manager.B . You can use filters to include only logs from a single device.C . The fetching profile must include a user with...

February 4, 2025 No Comments READ MORE +

What is a valid reason for using the Full Search option, instead?

When performing a log search on a FortiAnalyzer, it is generally recommended to use the Quick Search option. What is a valid reason for using the Full Search option, instead?A . The search items you are looking for are not contained in indexed log fields.B . A quick search only...

February 3, 2025 No Comments READ MORE +

What happens when the IOC breach detection engine on FortiAnalyzer finds web logs that match a blocklisted IP address?

What happens when the IOC breach detection engine on FortiAnalyzer finds web logs that match a blocklisted IP address?A . The endpoint is marked as Compromised and. optionally, can be put in quarantine.B . FortiAnalyzer flags the associated host for further analysis.C . A new Infected entry is added for...

January 23, 2025 No Comments READ MORE +

Which two statements about log forwarding are true? (Choose two.)

Which two statements about log forwarding are true? (Choose two.)A . Forwarded logs cannot be filtered to match specific criteria.B . Logs are forwarded in real-time only.C . The client retains a local copy of the logs after forwarding.D . You can use aggregation mode only with another FortiAnalyzer.View AnswerAnswer:...

January 22, 2025 No Comments READ MORE +

Which two methods can you use to send event notifications when an event occurs that matches a configured event handler? (Choose two.)

Which two methods can you use to send event notifications when an event occurs that matches a configured event handler? (Choose two.)A . SMSB . EmailC . SNMPD . IMView AnswerAnswer: BC

January 21, 2025 No Comments READ MORE +

Which filter will achieve the desired result?

Refer to the exhibit. Laptop1 is used by several administrators to manage FortiAnalyzer. You want to configure a generic text filter that matches all login attempts to the web interface generated by any user other than "admin" and coming from Laptop1. Which filter will achieve the desired result?A . operation-login...

January 21, 2025 No Comments READ MORE +