Free FCSS – Security Operations 7.4 Analyst Exam FCSS_SOC_AN-7.4 Exam Practice Test

UNLOCK FULL
FCSS_SOC_AN-7.4 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 7
Total Questions: 32
  • When configuring a FortiAnalyzer to act as a collector device, which two steps must you perform? (Choose two.)

    Answer: B,D Next Question
  • Review the following incident report:Attackers leveraged a phishing email campaign targeting your employees.The email likely impersonated a trusted source, such as the IT department, and requested login credentials.An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).The RAT provided the attackers with remote access and a foothold in the compromised system. Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)

    Answer: A,D Next Question
  • Your company is doing a security audit To pass the audit, you must take an inventory of all software and applications running on all Windows devicesWhich FortiAnalyzer connector must you use?

    Answer: A Next Question
  • Which two ways can you create an incident on FortiAnalyzer? (Choose two.)

    Answer: B,D Next Question
  • According to the National Institute of Standards and Technology (NIST) cybersecurity framework, incident handling activities can be divided into phases.In which incident handling phase do you quarantine a compromised host in order to prevent an adversary from using it as a stepping stone to the next phase of an attack?

    Answer: A Next Question
  • Which role does a threat hunter play within a SOC?

    Answer: C Next Question
  • A customer wants FortiAnalyzer to run an automation stitch that executes a CLI command on FortiGate to block a predefined list of URLs, if a botnet command-and-control (C&C) server IP is detected.Which FortiAnalyzer feature must you use to start this automation process?

    Answer: C Next Question
  • Which three end user logs does FortiAnalyzer use to identify possible IOC compromised hosts? (Choose three.)

    Answer: B,D,E Next Question
  • Which two types of variables can you use in playbook tasks? (Choose two.)

    Answer: A,B Next Question
  • When does FortiAnalyzer generate an event?

    Answer: C Next Question
Page: 1 / 7
Total Questions: 32