Which two methods are the most common methods to control and restrict administrative access on FortiAnalyzer? (Choose two.)
Answer(s): B,C
https://docs2.fortinet.com/document/fortianalyzer/6.0.0/administration- guide/219292/administrator-profiles https://docs2.fortinet.com/document/fortianalyzer/6.0.0/administration-guide/581222/trusted- hosts
Which daemon is responsible for enforcing raw log file size?
Answer(s): A
An administrator has configured the following settings:config system global set log-checksum md5-auth endWhat is the significance of executing this command?
Answer(s): D
https://docs.fortinet.com/document/fortianalyzer/6.4.6/administration- guide/410387/appendix-b-log-integrity-and-secure-log-transfer
Which two of the following must you configure on FortiAnalyzer to email a FortiAnalyzer report externally? (Choose two.)
Answer(s): A,B
https://docs.fortinet.com/document/fortianalyzer/6.0.2/administration- guide/598322/creating-output-profiles
Post your Comments and Discuss Fortinet NSE5_FAZ-7.2 exam prep with other Community members:
We’re offering these study questions to support your success. The least you can do? Drop a useful comment about each question. Help others. Build the community.