Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Fortinet Certified Professional Security Operations FCP_FSM_AN-7.2 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam FCP_FSM_AN-7.2 Premium Access

View all detail and faqs for the FCP_FSM_AN-7.2 exam


435 Students Passed

88% Average Score

96% Same Questions
Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

What can you use to send data to FortiSIEM for user and entity behavior analytics (UEBA)?

Options:

A.

FortiSIEM agent

B.

SSH

C.

SNMP

D.

FortiSIEM worker

Questions # 2:

Refer to the exhibit.

Question # 2

The analyst is troubleshooting the analytics query shown in the exhibit.

Why is this search not producing any results?

Options:

A.

The Time Range is set incorrectly.

B.

The inner and outer nested query attribute types do not match.

C.

You cannot reference User and Event Type attributes in the same search.

D.

The Boolean operator is wrong between the attributes.

Questions # 3:

How can you query the configuration management database (CMDB) in an analytics search?

Options:

A.

Click Value > Select from CMDB.

B.

On the CMDB tab, select an entry, and then click Create Search.

C.

On the Admin tab, click CMDB Search.

D.

Click Attribute > Select from CMDB.

Questions # 4:

Refer to the exhibit.

Question # 4

If you group the events by User, Source IP, and Count attributes, how many results will FortiSIEM display?

Options:

A.

Two

B.

Six

C.

Three

D.

Five

E.

Four

Questions # 5:

Refer to the exhibit.

Question # 5

Which value would you expect the FortiSIEM parser to use to populate the Application Name field?

Options:

A.

applist

B.

Network.Service

C.

SSL

D.

wan1

Questions # 6:

Refer to the exhibit.

Question # 6

What happens when an analyst clears an incident generated by a rule containing the automation policy shown in the exhibit?

Options:

A.

No notification is sent.

B.

An email is sent to the SOC manager.

C.

The remediation script is run.

D.

A notification is sent to the SOC manager dashboard.

Questions # 7:

What are two required components of a rule? (Choose two.)

Options:

A.

Exception policy

B.

Subpattern

C.

Detection Technology

D.

Clear policy

Questions # 8:

Refer to the exhibit.

Question # 8

Which two lookup types can you reference as the subquery in a nested analytics query? (Choose two.)

Options:

A.

LDAP Query

B.

CMDB Query

C.

SNMP Query

D.

Event Query

Questions # 9:

Refer to the exhibit.

Question # 9

Which two conditions will match this rule and subpatterns? (Choose two.)

Options:

A.

A user using RDP over SSL VPN fails to log in to an application five times.

B.

A user runs a brute force password cracker against an RDP server.

C.

A user fails twice to log in when connecting through RDP.

D.

A user connects to the wrong IP address for an RDP session five times.

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.