Fortinet FCSS_ADA_AR-6.7 Exam
FCSS - Advanced Analytics 6.7 Architect (Page 2 )

Updated On: 7-Feb-2026

A service provider purchases a licensed EPS of 520. The guaranteed EPS allocated to three customers is 50, 100, and 150 respectively. At the end of every three-minute interval, incoming EPS is calculated at every collector and the value is sent to the central decision-making engine on the supervisor node. The incoming EPS for the first collector is 25. the incoming EPS for the second collector is 50, and the incoming EPS for the third collector is 75.
Based on the information provided, what is the unused events total calculated by the supervisor?

  1. 76.000
  2. 35.960
  3. 75.960
  4. 71.460

Answer(s): D

Explanation:

Guaranteed Allocation: 50 + 100 + 150 = 300 EPS
Actual (Incoming) Usage: 25 + 50 + 75 = 150 EPS
Unused from guarantees = 300 - 150 = 150 EPS

Burst Capacity (Licensed minus Guaranteed): 520 - 300 = 220 EPS

Total Unused Capacity: 150 + 220 = 370 EPS
As a Percentage of Licensed EPS: 370/520 71.15% reported (after conversion/rounding) as ~71.460



Which statement accurately contrasts lookup tables with watchlists?

  1. Lookup table values age out after a period, whereas watchlist values do not have any time condition.
  2. You can populate lookup tables through an incident, whereas you cannot populate watchlists through an incident.
  3. Lookup tables can contain multiple columns, whereas watchlists contain only a single column.
  4. You can reference lookup table data in analytic queries and reports almost immediately, whereas you may have to wait up to 5-10 minutes for watchlist entries to be useable in queries and reports.

Answer(s): C

Explanation:

Lookup tables and watchlists serve different purposes in Fortinet's Advanced Analytics:
Lookup tables allow for structured data storage with multiple columns, making them useful for correlating different attributes or key-value pairs.
Watchlists are simpler and contain only a single column, often used for quick reference to flagged values, such as IP addresses or user accounts.



Refer to the exhibit.



How long has the UEBA agent been operationally down?

  1. 2 Hours
  2. 20 Hours
  3. 21 Hours
  4. 9 Hours

Answer(s): B

Explanation:

Based on the provided exhibit, we can determine how long the UEBA agent has been operationally down by looking at the "First Occurred" and "Last Occurred" timestamps.
First Occurred: Sep 13, 2021, at 01:10 PM
Last Occurred: Sep 14, 2021, at 09:10 AM
From Sep 13, 01:10 PM to Sep 14, 01:10 AM 12 hours
From Sep 14, 01:10 AM to Sep 14, 09:10 AM 8 hours
Total downtime = 12 + 8 = 20 hours



How can you empower SOC by deploying FortiSOAR? (Choose three.)

  1. Collaborative knowledge sharing
  2. Aggregate logs from distributed systems
  3. Address analyst skills gap
  4. Baseline user and traffic behavior
  5. Reduce human error

Answer(s): A,C,E

Explanation:

Collaborative knowledge sharing: FortiSOAR enables security teams to share knowledge, automate workflows, and improve incident response efficiency by centralizing intelligence and standardizing processes.
Addressing analyst skills gap: By automating repetitive tasks and providing guided response playbooks, FortiSOAR helps SOC teams compensate for skill shortages and improve operational effectiveness.
Reducing human error: Automation and predefined workflows minimize manual interventions, reducing the likelihood of errors in incident detection, response, and remediation.



Refer to the exhibit.



This is an example of a baseline profile that is configured in the backend of FortiSIEM.

Which two Group By attributes are configured for this profile? (Choose two.)

  1. Logon Failure
  2. Reporting Device
  3. Reporting IP
  4. Distinct User

Answer(s): B,C

Explanation:

From the provided XML configuration, we need to focus on the <GroupByAttr> section, which defines the attributes used for grouping.
In the SelectClause, the following attributes are listed:
reptDevName, reptDevAddr, COUNT(*), COUNT(DISTINCT user), COUNT(DISTINCT srcIpAddr) reptDevName represents the reporting device.
reptDevAddr represents the reporting IP.

COUNT(DISTINCT user) tracks unique users.
COUNT(DISTINCT srcIpAddr) tracks distinct source IPs.
In the GroupByAttr section:
<GroupByAttr>reptDevName, reptDevAddr</GroupByAttr>

This confirms that the grouping is performed by Reporting Device (reptDevName) and Reporting IP (reptDevAddr).






Post your Comments and Discuss Fortinet FCSS_ADA_AR-6.7 exam prep with other Community members:

Join the FCSS_ADA_AR-6.7 Discussion