10/214 questions ยท Unlock full access
Q1

A FortiSOAR administrator is tasked with integrating a new threat intelligence platform that requires communication through a corporate forward proxy. The proxy requires authentication. After configuring the proxy settings in the FortiSOAR UI, the connector still fails to connect. Which command-line utility should the administrator use to verify and troubleshoot the proxy connectivity from the FortiSOAR appliance's shell?

Q2Multiple answers

A security architect is designing a multi-tiered role-based access control (RBAC) model for a global SOC. The requirements state that Level 1 (L1) analysts should only see incidents assigned to their specific regional team and should not be able to view sensitive PII fields within those incidents. What two FortiSOAR features are essential to implement this granular access control? (Choose two.)

Q3

During a routine audit, an administrator discovers that a junior analyst was able to view and modify a high-severity financial fraud incident they should not have had access to. The analyst is part of the 'Tier 1 SOC' team, which has restricted permissions. What is the most likely reason for this unintended access?

Q4

A FortiSOAR administrator needs to perform a version upgrade from 7.3.0 to 7.3.1. To ensure system integrity and minimize downtime, they must follow the correct procedure. Which of the following represents the correct, high-level sequence of steps for performing the upgrade? ```mermaid flowchart TD A[Start] --> B{Take VM Snapshot / Backup}; B --> C{Download Upgrade Package}; C --> D{Run Pre-check Script}; D --> E{Execute Upgrade Script}; E --> F{Reboot System}; F --> G[End]; ```

Q5

True or False: When FortiSOAR is configured in a High Availability (HA) cluster, playbooks are automatically synchronized and executed on the active node only.

Q6

A FortiSOAR administrator has been asked to externalize the Elasticsearch database to a dedicated, multi-node cluster for improved performance and scalability. After running the externalization script, what is the final step required to make the change effective?

Q7

A SOC manager wants to track the Mean Time to Resolution (MTTR) for different incident types. To do this, they need to export all incident data from the last quarter, including custom fields, for analysis in an external business intelligence tool. Which FortiSOAR feature provides the most efficient way to accomplish this bulk data export?

Q8Multiple answers

A new FortiSOAR deployment is being planned. The security team wants to ensure that user authentication is managed centrally through their existing Active Directory infrastructure. Which two authentication methods in FortiSOAR are suitable for this requirement? (Choose two.)

Q9

A playbook designed to quarantine a malicious endpoint is failing intermittently. The administrator suspects a problem with the underlying `uwsgi` service that handles playbook execution. Which log file should the administrator examine first to find detailed error messages related to this service?

Q10

An administrator is exporting the full system configuration of a FortiSOAR instance to migrate it to a new appliance. Which statement accurately describes the contents of the exported `.tgz` file?