0% found this document useful (0 votes)
31 views

NSE5_FSM-6.3 (49 Questions)

NSE5_FSM-6.3 (49 Questions) NSE5_FSM-6.3 (49 Questions) NSE5_FSM-6.3 (49 Questions) NSE5_FSM-6.3 (49 Questions)

Uploaded by

Innovior IT Tech
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

NSE5_FSM-6.3 (49 Questions)

NSE5_FSM-6.3 (49 Questions) NSE5_FSM-6.3 (49 Questions) NSE5_FSM-6.3 (49 Questions) NSE5_FSM-6.3 (49 Questions)

Uploaded by

Innovior IT Tech
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

NSE5_FSM-6.

3 (49 Questions)

Number: 000-000
Passing Score: 800
Time Limit: 120 min
File Version: 1.0

Vendor: Fortinet

Exam Code: NSE5_FSM-6.3

Exam Name: Fortinet NSE 5 - FortiSIEM 6.3


Innovior ITTech

Q&A

Fortinet NSE 5 - FortiSIEM 6.3


NSE5_FSM-6.3

(49 Questions)

http://www.facebook.com/InnoviorITTech

We Offer Free Update Service


For One Year.
QUESTION 1
When configuring collectors located in geographically separated sites, what ports must be open on a front
end firewall?

A. HTTPS, from the collector to the worker upload settings address only
B. HTTPS, from the collector to the supervisor and worker upload settings addresses
C. HTTPS, from the Internet to the collector
D. HTTPS, from the Internet to the collector and from the collector to the FortiSIEM cluster

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:

FortiSIEM Architecture: In FortiSIEM, collectors gather data from various sources and send this data to
supervisors and workers within the FortiSIEM architecture. Communication Requirements: For collectors to
effectively send data to the FortiSIEM system, specific communication channels must be open. Port
Usage: The primary port used for secure communication between the collectors and the FortiSIEM
infrastructure is HTTPS (port 443). Network Configuration: When configuring collectors in geographically
separated sites, the HTTPS port must be open for the collectors to communicate with both the supervisor
and the worker upload settings addresses. This ensures that the collected data can be securely
transmitted to the appropriate processing and analysis components.

Reference:

FortiSIEM 6.3 Administration Guide, Network Ports section details the necessary ports for communication
within the FortiSIEM architecture.

QUESTION 2
An administrator is in the process of renewing a FortiSIEM license. Which two commands will provide the
system ID? (Choose two.)

A. phgetHWID
B. ./phLicenseTool - support
C. phgetUUID
D. ./phLicenseTool-show

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:
Explanation:

License Renewal Process: When renewing a FortiSIEM license, it is essential to provide the system ID,
which uniquely identifies the FortiSIEM instance.
Commands to Retrieve System ID:
phgetHWID: This command retrieves the hardware ID of the FortiSIEM appliance. Usage: Run the
command phgetHWID in the CLI to obtain the hardware ID. phgetUUID:
This command retrieves the universally unique identifier (UUID) for the FortiSIEM system.
Usage: Run the command phgetUUID in the CLI to obtain the UUID. Verification: Both phgetHWID and
phgetUUID are valid commands for retrieving the necessary system IDs required for license renewal.

Reference:

FortiSIEM 6.3 Administration Guide, Licensing section details the commands and procedures for obtaining
system identification information necessary for license renewal.
QUESTION 3
Refer to the exhibit.

Which section contains the sortings that determine how many incidents are created?

A. Actions
B. Group By
C. Aggregate
D. Filters

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:

Incident Creation in FortiSIEM: Incidents in FortiSIEM are created based on specific patterns and
conditions defined within the system. Group By Function: The "Group By" section in the "Edit SubPattern"
window specifies how the data should be grouped for analysis and incident creation.

Impact of Grouping: The way data is grouped affects the number of incidents generated. Each unique
combination of the grouped attributes results in a separate incident. Exhibit Analysis: In the provided
exhibit, the "Group By" section lists "Reporting Device," "Reporting IP," and "User." This means incidents
will be created for each unique combination of these attributes. Reference:
FortiSIEM 6.3 User Guide, Rule and Pattern Creation section, which details how grouping impacts incident
generation.

QUESTION 4
Refer to the exhibit.
What does the pauso icon indicate?

A. Data collection is paused after the intervals shown for metrics.


B. Data collection has not started.
C. Data collection execution failed because the device is not reachable.
D. Data collection is paused duo to an issue, such as a change of password.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:

Data Collection Status: FortiSIEM displays various icons to indicate the status of data collection for
different devices.
Pause Icon: The pause icon specifically indicates that data collection is paused, but this can happen due to
several reasons.
Common Cause for Pausing: One common cause for pausing data collection is an issue such as a change
of password, which prevents the system from authenticating and collecting data.

Exhibit Analysis: In the provided exhibit, the presence of the pause icon next to the device suggests that
data collection has encountered an issue that has caused it to pause. Reference:
FortiSIEM 6.3 User Guide, Device Management and Data Collection Status Icons section, which explains
the different icons and their meanings.

QUESTION 5
Refer to the exhibit.

A FortiSIEM administrator wants to group some attributes for a report, but is not able to do so successfully.
As shown in the exhibit, why are some of the fields highlighted in red?

A. Unique attributes cannot be grouped.


B. The Event Receive Time attribute is not available for logs.
C. The attribute COUNT(Matched events) is an invalid expression.
D. No RAW Event Log attribute is available for devices.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:

Grouping Attributes in Reports: When creating reports in FortiSIEM, certain attributes can be grouped to
summarize and organize the data. Unique Attributes: Attributes that are unique for each event cannot be
grouped because they do not provide a meaningful aggregation or summary.
Red Highlighting

Reference:
The red highlighting in the exhibit indicates attributes that cannot be grouped together due to their unique
nature. These unique attributes include Event Receive Time, Reporting IP, Event Type, Raw Event Log,
and COUNT(Matched Events).
Attribute Characteristics:
Event Receive Time is unique for each event.
Reporting IP and Event Type can vary greatly, making grouping them impractical in this context. Raw
Event Log represents the unprocessed log data, which is also unique. COUNT(Matched Events) is a
calculated field, not suitable for grouping. FortiSIEM 6.3 User Guide, Reporting section, explains the
constraints on grouping attributes in reports.

QUESTION 6
Refer to the exhibit.

Which value will FortiSIEM use to populate the Event Type field?

A. PHL_INFO
B. phPerfJob
C. PH_DSV_MON_SYS_DISK_UTIL
D. diskUtil

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:

Event Type Population: In FortiSIEM, the Event Type field is populated based on specific identifiers within
the raw message or event log. Raw Message Analysis: The exhibit shows a raw message with various
components, including PH_DEV_MON_SYS_DISK_UTIL, PHL_INFO, phPerfJob, and diskUtil. Primary
Event Identifier: The PH_DEV_MON_SYS_DISK_UTIL at the beginning of the raw message is the primary
identifier for the event type. It categorizes the type of event, in this case, a system disk utilization
monitoring event. Event Type Field: FortiSIEM uses this primary identifier to populate the Event Type field,
providing a clear categorization of the event.

Reference:

FortiSIEM 6.3 User Guide, Event Processing and Event Types section, details how event types are
identified and populated in the system.

QUESTION 7
An administrator defines SMTP as a critical process on a Linux server. It the SMTP process is stopped.
FortiSIEM will generate a critical event with which event type?

A. Postfix-Mail-Stop
B. PH_DEV_MON_PROC_STOP
C. PH_DEV_MON_SMTP_STOP
D. Generic_SMTP_Procoss_Exit

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:

Process Monitoring in FortiSIEM: FortiSIEM can monitor critical processes on managed devices, such as
an SMTP process on a Linux server. Event Generation: When a critical process stops, FortiSIEM
generates an event to alert administrators.
Event Types: Specific event types correspond to different monitored conditions. For a stopped process, the
event type PH_DEV_MON_PROC_STOP is used. Reasoning:
The name PH_DEV_MON_PROC_STOP (Device Monitoring Process Stop) is a generic event type used
by FortiSIEM to indicate that any monitored process, including SMTP, has stopped. Reference:
FortiSIEM 6.3 User Guide, Event Types section, explains the predefined event types and their usage in
different monitoring scenarios.

QUESTION 8
Refer to the exhibit.

An administrator is investigating a FortiSIEM license issue. The procedure is for which offline licensing
condition?

A. The procedure is for offline license debug.


B. The procedure is for offline license registration.
C. The procedure is for offline license validation.
D. The procedure is for offline license verification.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy