What are two different services that you can configure for monitoring system and cluster health statuses on FortiSOAR? (Choose two.)

What are two different services that you can configure for monitoring system and cluster health statuses on FortiSOAR? (Choose two.)A . ExchangeB . POPC . IMAPD . SMTPView AnswerAnswer: AD

May 17, 2025 No Comments READ MORE +

What command facilitates the monitoring of live logs in FortiSOAR?

What command facilitates the monitoring of live logs in FortiSOAR?A . ls -lB . tail -fC . echo > logfile.logD . cp /var/log/fortisoar.logView AnswerAnswer: B

May 17, 2025 No Comments READ MORE +

Which of the following would indicate a possible NAT issue affecting an IKEv1 IPsec VPN tunnel?

Which of the following would indicate a possible NAT issue affecting an IKEv1 IPsec VPN tunnel?A . Phase 1 repeatedly re-establishingB . Consistent phase 2 negotiation failuresC . 'No proposal chosen' error in the event logD . Continuous 'NAT detected' log entriesView AnswerAnswer: D

May 17, 2025 No Comments READ MORE +

Which statement is true regarding FortiSOAR upgrades?

Which statement is true regarding FortiSOAR upgrades?A . Upgrades should be performed during peak system usageB . It is not necessary to inform users about planned downtimeC . A trial run in a test environment is recommended before upgrading productionD . Backup is optional if the previous version was stableView...

May 15, 2025 No Comments READ MORE +

How can administrators export FortiSOAR system configuration?

How can administrators export FortiSOAR system configuration?A . Through command line interface onlyB . Via the System Configuration section under AdministrationC . By manually copying configuration filesD . System configuration cannot be exportedView AnswerAnswer: B

May 5, 2025 No Comments READ MORE +

Which initial setting is crucial to ensure effective SOC and SOAR operation?

Which initial setting is crucial to ensure effective SOC and SOAR operation?A . Configuring the alert notification toneB . Setting up proper integration with threat intelligence feedsC . Choosing a background theme for the interfaceD . Selecting a preferred language for system promptsView AnswerAnswer: B

April 26, 2025 No Comments READ MORE +

Which two system monitoring reports available on the System Monitoring widget? (Choose two.)

Which two system monitoring reports available on the System Monitoring widget? (Choose two.)A . RAM UsageB . CPU UsageC . Service StatusD . Playbook Health StatusView AnswerAnswer: BC

April 21, 2025 No Comments READ MORE +

Configuring and operating a war room effectively involves which of the following?

Configuring and operating a war room effectively involves which of the following?A . Seamless integration with other cybersecurity toolsB . Decorative posters on the wallsC . Detailed logging and audit trailsD . Protocols for rapid decision-makingView AnswerAnswer: ACD

April 20, 2025 No Comments READ MORE +

Troubleshooting security management issues often involves reviewing ________ to identify recent changes or updates that could have introduced problems.

Troubleshooting security management issues often involves reviewing ________ to identify recent changes or updates that could have introduced problems.A . user complaintsB . network cable connectionsC . employee schedulesD . audit logsView AnswerAnswer: D

April 18, 2025 No Comments READ MORE +

Which edition of license, when deployed, will serve as a primary node in a distributed deployment?

Which edition of license, when deployed, will serve as a primary node in a distributed deployment?A . MTB . MT_TenantC . MT_RegionalSOCD . EnterpriseView AnswerAnswer: A

April 17, 2025 No Comments READ MORE +