Free FCSS – Security Operations 7.4 Analyst Exam FCSS_SOC_AN-7.4 Exam Practice Test
FCSS_SOC_AN-7.4 Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 32
-
When configuring a FortiAnalyzer to act as a collector device, which two steps must you perform? (Choose two.)
Answer: B,D Next Question -
Review the following incident report:Attackers leveraged a phishing email campaign targeting your employees.The email likely impersonated a trusted source, such as the IT department, and requested login credentials.An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).The RAT provided the attackers with remote access and a foothold in the compromised system. Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)
Answer: A,D Next Question -
Your company is doing a security audit To pass the audit, you must take an inventory of all software and applications running on all Windows devicesWhich FortiAnalyzer connector must you use?
Answer: A Next Question -
Which two ways can you create an incident on FortiAnalyzer? (Choose two.)
Answer: B,D Next Question -
According to the National Institute of Standards and Technology (NIST) cybersecurity framework, incident handling activities can be divided into phases.In which incident handling phase do you quarantine a compromised host in order to prevent an adversary from using it as a stepping stone to the next phase of an attack?
Answer: A Next Question -
Which role does a threat hunter play within a SOC?
Answer: C Next Question -
A customer wants FortiAnalyzer to run an automation stitch that executes a CLI command on FortiGate to block a predefined list of URLs, if a botnet command-and-control (C&C) server IP is detected.Which FortiAnalyzer feature must you use to start this automation process?
Answer: C Next Question -
Which three end user logs does FortiAnalyzer use to identify possible IOC compromised hosts? (Choose three.)
Answer: B,D,E Next Question -
Which two types of variables can you use in playbook tasks? (Choose two.)
Answer: A,B Next Question -
When does FortiAnalyzer generate an event?
Answer: C Next Question
Total Questions: 32