Which two methods are the most common methods to control and restrict administrative access on FortiAnalyzer? (Choose two.)
Answer(s): B,C
https://docs2.fortinet.com/document/fortianalyzer/6.0.0/administration-guide/219292/administrator-profileshttps://docs2.fortinet.com/document/fortianalyzer/6.0.0/administration-guide/581222/trusted- hosts
Which daemon is responsible for enforcing raw log file size?
Answer(s): B
An administrator has configured the following settings:config system globalset log-checksum md5-authendWhat is the significance of executing this command?
Answer(s): D
https://docs.fortinet.com/document/fortianalyzer/6.4.6/administration- guide/410387/appendix-b-log-integrity-and-secure-log-transfer
Which two of the following must you configure on FortiAnalyzer to email a FortiAnalyzer report externally? (Choose two.)
Answer(s): A,B
https://docs.fortinet.com/document/fortianalyzer/6.0.2/administration- guide/598322/creating-output-profiles
Post your Comments and Discuss Fortinet NSE5_FAZ-6.4 exam prep with other Community members:
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the NSE5_FAZ-6.4 content, but please register or login to continue.