View Mode
Q: 1
Which role does a threat hunter play within a SOC?
Options
Q: 2
Refer to the exhibits. FCSS_SOC_AN-7.4 question The DOS attack playbook is configured to create an incident when an event handler generates a denial-of-ser/ice (DoS) attack event. Why did the DOS attack playbook fail to execute?
Options
Q: 3
Which two statements about the FortiAnalyzer Fabric topology are true? (Choose two.)
Options
Q: 4
Refer to the exhibits. FCSS_SOC_AN-7.4 question The FortiMail Sender Blocklist playbook is configured to take manual input and add those entries to the FortiMail abc. com domain-level block list. The playbook is configured to use a FortiMail connector and the ADD_SENDER_TO_BLOCKLIST action. Why is the FortiMail Sender Blocklist playbook execution failing7
Options
Q: 5
Refer to the exhibit. FCSS_SOC_AN-7.4 question You notice that the custom event handler you configured to detect SMTP reconnaissance activities is creating a large number of events. This is overwhelming your notification system. How can you fix this?
Options
Q: 6
Which statement best describes the MITRE ATT&CK framework?
Options
Q: 7
Refer to the exhibits. FCSS_SOC_AN-7.4 question You configured a custom event handler and an associated rule to generate events whenever FortiMail detects spam emails. However, you notice that the event handler is generating events for both spam emails and clean emails. Which change must you make in the rule so that it detects only spam emails?
Options
Q: 8
Refer to the exhibits. FCSS_SOC_AN-7.4 question You configured a spearphishing event handler and the associated rule. However. FortiAnalyzer did not generate an event. When you check the FortiAnalyzer log viewer, you confirm that FortiSandbox forwarded the appropriate logs, as shown in the raw log exhibit. What configuration must you change on FortiAnalyzer in order for FortiAnalyzer to generate an event?
Options
Q: 9
Which two playbook triggers enable the use of trigger events in later tasks as trigger variables? (Choose two.)
Options
Q: 10
Review the following incident report: Attackers leveraged a phishing email campaign targeting your employees. The email likely impersonated a trusted source, such as the IT department, and requested login credentials. An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT). The RAT provided the attackers with remote access and a foothold in the compromised system. Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE