Which two methods are the most common methods to control and restrict administrative access on FortiAnalyzer? (Choose two.)
Answer(s): B,C
https://docs2.fortinet.com/document/fortianalyzer/6.0.0/administration-guide/219292/administrator-profileshttps://docs2.fortinet.com/document/fortianalyzer/6.0.0/administration-guide/581222/trusted- hosts
Which daemon is responsible for enforcing raw log file size?
Answer(s): B
An administrator has configured the following settings:config system globalset log-checksum md5-authendWhat is the significance of executing this command?
Answer(s): D
https://docs.fortinet.com/document/fortianalyzer/6.4.6/administration- guide/410387/appendix-b-log-integrity-and-secure-log-transfer
Which two of the following must you configure on FortiAnalyzer to email a FortiAnalyzer report externally? (Choose two.)
Answer(s): A,B
https://docs.fortinet.com/document/fortianalyzer/6.0.2/administration- guide/598322/creating-output-profiles
Post your Comments and Discuss Fortinet NSE5_FAZ-6.4 exam with other Community members: