Free FCSS_ADA_AR-6.7 Exam Braindumps (page: 2)

Page 2 of 9

A service provider purchases a licensed EPS of 520. The guaranteed EPS allocated to three customers is 50, 100, and 150 respectively. At the end of every three-minute interval, incoming EPS is calculated at every collector and the value is sent to the central decision-making engine on the supervisor node. The incoming EPS for the first collector is 25. the incoming EPS for the second collector is 50, and the incoming EPS for the third collector is 75.
Based on the information provided, what is the unused events total calculated by the supervisor?

  1. 76.000
  2. 35.960
  3. 75.960
  4. 71.460

Answer(s): D

Explanation:

Guaranteed Allocation: 50 + 100 + 150 = 300 EPS
Actual (Incoming) Usage: 25 + 50 + 75 = 150 EPS
Unused from guarantees = 300 - 150 = 150 EPS

Burst Capacity (Licensed minus Guaranteed): 520 - 300 = 220 EPS

Total Unused Capacity: 150 + 220 = 370 EPS
As a Percentage of Licensed EPS: 370/520 71.15% reported (after conversion/rounding) as ~71.460



Which statement accurately contrasts lookup tables with watchlists?

  1. Lookup table values age out after a period, whereas watchlist values do not have any time condition.
  2. You can populate lookup tables through an incident, whereas you cannot populate watchlists through an incident.
  3. Lookup tables can contain multiple columns, whereas watchlists contain only a single column.
  4. You can reference lookup table data in analytic queries and reports almost immediately, whereas you may have to wait up to 5-10 minutes for watchlist entries to be useable in queries and reports.

Answer(s): C

Explanation:

Lookup tables and watchlists serve different purposes in Fortinet's Advanced Analytics:
Lookup tables allow for structured data storage with multiple columns, making them useful for correlating different attributes or key-value pairs.
Watchlists are simpler and contain only a single column, often used for quick reference to flagged values, such as IP addresses or user accounts.



Refer to the exhibit.



How long has the UEBA agent been operationally down?

  1. 2 Hours
  2. 20 Hours
  3. 21 Hours
  4. 9 Hours

Answer(s): B

Explanation:

Based on the provided exhibit, we can determine how long the UEBA agent has been operationally down by looking at the "First Occurred" and "Last Occurred" timestamps.
First Occurred: Sep 13, 2021, at 01:10 PM
Last Occurred: Sep 14, 2021, at 09:10 AM
From Sep 13, 01:10 PM to Sep 14, 01:10 AM 12 hours
From Sep 14, 01:10 AM to Sep 14, 09:10 AM 8 hours
Total downtime = 12 + 8 = 20 hours



How can you empower SOC by deploying FortiSOAR? (Choose three.)

  1. Collaborative knowledge sharing
  2. Aggregate logs from distributed systems
  3. Address analyst skills gap
  4. Baseline user and traffic behavior
  5. Reduce human error

Answer(s): A,C,E

Explanation:

Collaborative knowledge sharing: FortiSOAR enables security teams to share knowledge, automate workflows, and improve incident response efficiency by centralizing intelligence and standardizing processes.
Addressing analyst skills gap: By automating repetitive tasks and providing guided response playbooks, FortiSOAR helps SOC teams compensate for skill shortages and improve operational effectiveness.
Reducing human error: Automation and predefined workflows minimize manual interventions, reducing the likelihood of errors in incident detection, response, and remediation.



Refer to the exhibit.



This is an example of a baseline profile that is configured in the backend of FortiSIEM.

Which two Group By attributes are configured for this profile? (Choose two.)

  1. Logon Failure
  2. Reporting Device
  3. Reporting IP
  4. Distinct User

Answer(s): B,C

Explanation:

From the provided XML configuration, we need to focus on the <GroupByAttr> section, which defines the attributes used for grouping.
In the SelectClause, the following attributes are listed:
reptDevName, reptDevAddr, COUNT(*), COUNT(DISTINCT user), COUNT(DISTINCT srcIpAddr) reptDevName represents the reporting device.
reptDevAddr represents the reporting IP.

COUNT(DISTINCT user) tracks unique users.
COUNT(DISTINCT srcIpAddr) tracks distinct source IPs.
In the GroupByAttr section:
<GroupByAttr>reptDevName, reptDevAddr</GroupByAttr>

This confirms that the grouping is performed by Reporting Device (reptDevName) and Reporting IP (reptDevAddr).



Refer to the exhibit.



Which scenario is not a supported nested query scenario?

  1. The outer query is the event query, and the inner query is the event query.
  2. The outer query is the event query, and the inner query is the CMDB query.
  3. The outer query is the CMDB query, and the inner query is the event query.
  4. The outer query is the CMDB query, and the inner query is the CMDB query.

Answer(s): D

Explanation:

FortiSIEM does not allow CMDB queries to be nested within other CMDB queries. CMDB data is static information, and nesting would not add value or function properly in query execution.



When you perform a Group By on a structured query, which two outcomes occur? (Choose two.)

  1. Group By automatically applies a COUNT aggregation.
  2. Group By is applied to real-time and historical searches.
  3. Group By cannot be applied to an aggregated function.
  4. Group By is applied to historical searches only.

Answer(s): A,B

Explanation:

Group By automatically applies a COUNT aggregation.
When using Group By in FortiSIEM structured queries, it automatically applies a COUNT(*) function unless a different aggregation (such as SUM, AVG, or MAX) is specified. This helps summarize data by counting occurrences of grouped attributes.
Group By is applied to real-time and historical searches. Grouping functions work in both real-time (live event monitoring) and historical (past event analysis) searches, making it useful for trend analysis, anomaly detection, and correlation.



Refer to the exhibit.



Within what time window is the incident auto cleared?

  1. 1800 seconds
  2. Null
  3. 1 day
  4. 30 minutes

Answer(s): B

Explanation:

In the exhibit, the "Clear If" condition does not specify a condition for auto-clearing the incident. If an incident does not have a specific clear condition, it remains active until manually resolved or cleared by another process.






Post your Comments and Discuss Fortinet FCSS_ADA_AR-6.7 exam with other Community members:

FCSS_ADA_AR-6.7 Exam Discussions & Posts