NSE5_FSM-6.3 Dumps

NSE5_FSM-6.3 Braindumps NSE5_FSM-6.3 Real Questions NSE5_FSM-6.3 Practice Test NSE5_FSM-6.3 Actual Questions


Fortinet


NSE5_FSM-6.3


NSE 5 - FortiSIEM 6.3


https://killexams.com/pass4sure/exam-detail/NSE5_FSM-6.3

Question: 119


To determine whether or not syslog is being received from a network device, which is the best command from the backend?


  1. tcpdump

  2. phDeviceTest

  3. netcat

  4. phSyslogRecorder


Answer: A Question: 120

What operating system is FortiSIEM based on?


  1. Cent OS

  2. Microsoft Windows

  3. RedHat

  4. Ubuntu


Answer: A Question: 121

A FortiSIEM supervisor at headquarters is struggling to keep up with an increase of EPS (Events Per Second) being reported across the enterprise.


What components should an administrator consider deploying to assist the supervisor with processing data?


  1. Supervisor

  2. Worker

  3. Collector

  4. Agent


Answer: B Question: 122

What protocol can be used to collect Windows event logs in an agentless method?


  1. SSH

  2. SNMP

  3. WMI

  4. SMTP


Answer: C Question: 123

If the reported packet loss is between 50% and 98%. which status is assigned to the device in the Availability column of summary dashboard?

  1. Down status is assigned because of packet loss.

  2. Up status is assigned because of received packets

  3. Critical status is assigned because of reduction in number of packets received

  4. Degraded status is assigned because of packet loss


Answer: D Question: 124

What is a prerequisite for FortiSIEM Linux agent installation?


  1. The web server must be installed on the Linux server being monitored

  2. The auditd service must be installed on the Linux server being monitored

  3. The Linux agent manager server must be installed.

  4. Both the web server and the audit service must be installed on the Linux server being monitored


Answer: B Question: 125

Which FortiSIEM components are capable of performing device discovery?


  1. FortiSIEM Windows agent

  2. Worker

  3. FortiSIEM Linux agent

  4. Collector


Answer: D Question: 126

If a performance rule is triggered repeatedly due to high CPU use. what occurs m the incident table?


  1. A new incident is created each time the rule is triggered, and the First Seen and Last Seen times are updated.

  2. The incident status changes to Repeated and the First Seen and Last Seen times are updated.

  3. A new incident is created based on the Rule Frequency value, and the First Seen and Last Seen times are updated

  4. The Incident Count value increases, and the First Seen and Last Seen tomes update


Answer: D Question: 127

In FotiSlEM enterprise licensing mode, if the link between the collector and data center FortiSlEM cluster a down what happens?


  1. The collector drops incoming events like syslog. but slops performance collection

  2. The collector continues performance collection of devices, but stops receiving syslog

  3. The collector buffers events

  4. The collector processes stop, and events are dropped


Answer: C

Question: 128


A FortiSIEM administrator wants to restrict a network administrator to running searches for only firewall devices. Under role management, which option does the FortiSIEM administrator need to configure to achieve this scenario?

  1. CMDB Report Conditions

  2. Data Conditions

  3. UI Access


Answer: B