Practice Free NSE6_FSR-7.3 Exam Online Questions
What are the prerequisites for configuring applications within FortiSOAR? (Choose two)
- A . Valid license for each application
- B . Network connectivity to external application servers
- C . Specialized hardware modules
- D . Direct database modifications
________ authentication is primarily concerned with verifying the identity of individuals attempting to access the system.
- A . Server
- B . Network
- C . User
- D . Device
Which tool is primarily used to monitor CPU and memory usage in FortiSOAR?
- A . FortiMonitor
- B . htop
- C . FortiAnalyzer
- D . top
Which playbook collection includes system-level playbooks that FortiSOAR uses to auto-populate date fields when the status of incident or alert records changes to Resolved or Closed?
- A . SLA Management Playbooks
- B . Utilities Playbooks
- C . Schedule Management Playbooks
- D . Approval/Manual Task Playbooks
A
Explanation:
The SLA Management Playbooks collection in FortiSOAR includes system-level playbooks designed to auto-populate date fields when the status of incident or alert records changes to Resolved or Closed. This functionality ensures that relevant date fields, such as resolution date or closure date, are accurately filled based on SLA criteria. By using SLA Management Playbooks, FortiSOAR automatically maintains date-related data integrity, which is essential for tracking and reporting purposes.
When externalizing Elasticsearch data for better management, which practices are beneficial?
- A . Using a single large disk for all data
- B . Implementing data tiering strategies
- C . Ensuring high availability through clustering
- D . Regularly updating the Elasticsearch version
Which of the following are true regarding audit logs in FortiSOAR? (Choose two)
- A . They can be exported for external analysis.
- B . They are only accessible by system administrators.
- C . They include information about system errors.
- D . They are deleted after 30 days for performance reasons.
What command can be used to monitor real-time FortiSOAR process activities?
- A . ps aux
- B . grep FortiSOAR
- C . tail -f
- D . systemctl
What are two system-level logs that can be purged using application configuration? (Choose two.)
- A . Connector logs
- B . Reporting logs
- C . Audit togs
- D . Executed Playbook logs
AB
Explanation:
In FortiSOAR, system-level logs that can be purged include both "Audit logs" and "Executed Playbook logs." These types of logs can be configured to be purged periodically to free up storage space and ensure that unnecessary logs do not impact system performance. The application configuration allows administrators to schedule automatic purges, which can be especially useful in high-activity environments where log data accumulates quickly. Purging these logs helps maintain a cleaner and more efficient system.
Role-Based Access Control (RBAC) limits system access to authorized users.
What does RBAC primarily manage?
- A . The physical access to buildings
- B . Permissions based on user roles
- C . Internet bandwidth per user
- D . The number of logins per user
Which two relationship types are configurable on FortiSOAR? (Choose two.)
- A . Siblings
- B . Grandparents
- C . Parents
- D . Relatives
