Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Fortinet Certified Solution Specialist FCSS_SOC_AN-7.4 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam FCSS_SOC_AN-7.4 Premium Access

View all detail and faqs for the FCSS_SOC_AN-7.4 exam


374 Students Passed

89% Average Score

96% Same Questions
Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

When configuring a FortiAnalyzer to act as a collector device, which two steps must you perform?(Choose two.)

Options:

A.

Enable log compression.

B.

Configure log forwarding to a FortiAnalyzer in analyzer mode.

C.

Configure the data policy to focus on archiving.

D.

Configure Fabric authorization on the connecting interface.

Questions # 2:

Refer to the exhibit.

Question # 2

You notice that the custom event handler you configured to detect SMTP reconnaissance activities is creating a large number of events. This is overwhelming your notification system.

How can you fix this?

Options:

A.

Increase the trigger count so that it identifies and reduces the count triggered by a particular group.

B.

Disable the custom event handler because it is not working as expected.

C.

Decrease the time range that the custom event handler covers during the attack.

D.

Increase the log field value so that it looks for more unique field values when it creates the event.

Questions # 3:

Which two ways can you create an incident on FortiAnalyzer? (Choose two.)

Options:

A.

Using a connector action

B.

Manually, on the Event Monitor page

C.

By running a playbook

D.

Using a custom event handler

Questions # 4:

Refer to the exhibits.

Question # 4

The Malicious File Detect playbook is configured to create an incident when an event handler generates a malicious file detection event.

Why did the Malicious File Detect playbook execution fail?

Options:

A.

The Create Incident task was expecting a name or number as input, but received an incorrect data format

B.

The Get Events task did not retrieve any event data.

C.

The Attach_Data_To_lncident incident task wasexpecting an integer, but received an incorrect data format.

D.

The Attach Data To Incident task failed, which stopped the playbook execution.

Questions # 5:

Refer to the exhibit,

Question # 5

which shows the partial output of the MITRE ATT&CK Enterprise matrix on FortiAnalyzer.

Which two statements are true? (Choose two.)

Options:

A.

There are four techniques that fall under tactic T1071.

B.

There are four subtechniques that fall under technique T1071.

C.

There are event handlers that cover tactic T1071.

D.

There are 15 events associated with the tactic.

Questions # 6:

Review the following incident report:

Attackers leveraged a phishing email campaign targeting your employees.

The email likely impersonated a trusted source, such as the IT department, and requested login credentials.

An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).

The RAT provided the attackers with remote access and a foothold in the compromised system.

Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)

Options:

A.

Initial Access

B.

Defense Evasion

C.

Lateral Movement

D.

Persistence

Questions # 7:

Refer to Exhibit:

Question # 7

A SOC analyst is creating the Malicious File Detected playbook to run when FortiAnalyzer generates a malicious file event. The playbook must also update the incident with the malicious file event data.

What must the next task in this playbook be?

Options:

A.

A local connector with the action Update Asset and Identity

B.

A local connector with the action Attach Data to Incident

C.

A local connector with the action Run Report

D.

A local connector with the action Update Incident

Questions # 8:

Refer to the exhibits.

Question # 8

What can you conclude from analyzing the data using the threat hunting module?

Options:

A.

Spearphishing is being used to elicit sensitive information.

B.

DNS tunneling is being used to extract confidential data from the local network.

C.

Reconnaissance is being used to gather victim identityinformation from the mail server.

D.

FTP is being used as command-and-control (C&C) technique to mine for data.

Questions # 9:

Which two types of variables can you use in playbook tasks? (Choose two.)

Options:

A.

input

B.

Output

C.

Create

D.

Trigger

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.