Marcos Avila
Quiz by , created more than 1 year ago

NSE4 6.0 NSE4 6.0 Quiz on Logging and monitoring II, created by Marcos Avila on 14/09/2018.

703
1
0
Marcos Avila
Created by Marcos Avila over 5 years ago
Close

Logging and monitoring II

Question 1 of 22

1

Unified event correlation and risk management
Collect, parse, normalize, index. and store security logs

Select one of the following:

  • FortiSIEM

  • FortiAnalyzer

  • FortiManager

Explanation

Question 2 of 22

1

Hosted subscription-based service
Long—term log storage and reporting
Bound to Fortinet Support account
FortiGate includes a free tier

Select one of the following:

  • FortiCloud

  • FortiSIEM

  • FortiAnalyzer

Explanation

Question 3 of 22

1

Long term, dedicated storage of log data
Reports
Log limit dependent on model

Select one of the following:

  • FortiAnalyzer

  • FortiSIEM

  • Syslog

Explanation

Question 4 of 22

1

Logging server
Central repository for networked devices
Consolidates logs

Select one of the following:

  • FortiSIEM

  • FortiAnalyzer

  • Syslog

Explanation

Question 5 of 22

1

Like FortiAnalyzer. can also store logs and generate reports, but has fixed amount per day that is less than equivalent size FortiAnalyzer

Primary purpose: central administrative management of networked devices

Select one of the following:

  • FortiManager

  • FortiSIEM

  • FortiCloud

Explanation

Question 6 of 22

1

Configure logging options: (select 4)

Select one or more of the following:

  • store-and-upload (CLI configuration only)

  • Real time

  • Every Minute

  • Every 5 Minutes (default)

  • store-and-download (CLI configuration only)

  • Every 10 Minutes (default)

  • Every 30 seconds

Explanation

Question 7 of 22

1

By default, if the FortiAnaIyzer disk is full, the oldest logs never are overwritten. However, you can configure FortiAnalyzer to stop logging.

Select one of the following:

  • True
  • False

Explanation

Question 8 of 22

1

Fortigate uses ___ for log transmission

Select one of the following:

  • UDP 514 or TCP 514

  • UDP 415 or TCP 415

Explanation

Question 9 of 22

1

If using reliable logging, you can encrypt communications using

Select one of the following:

  • SSL—secured OFTP (OFTPS).

  • SSL—secured FTPS (FTPS)

  • SSL—secured FIPS (FIPS).

Explanation

Question 10 of 22

1

The primary purpose of which device is to store and analyze logs?

Select one of the following:

  • A. FortiAnaIyzer

  • B. FortiManager

Explanation

Question 11 of 22

1

What protocol does FortiGate use to send encrypted logs to FortiAnalyzer?

Select one of the following:

  • A. OFTPS

  • B. SSL

Explanation

Question 12 of 22

1

If you enable reliable logging, which transport protocol will FortiGate use?

Select one of the following:

  • A. UDP

  • B. TCP

Explanation

Question 13 of 22

1

Hiding user names in logs:

Select one of the following:

  • # config log setting
    set user-anonymize enable
    end

  • # config log
    edit setting
    set user-anonymous enable
    end

Explanation

Question 14 of 22

1

What setting on your firewall policy must you enable to generate logs on traffic sent through that firewall policy?

Select one of the following:

  • A. Log Allowed Traffic

  • B. Event Logging

Explanation

Question 15 of 22

1

Which log type can generate a large number of logs and is therefore disabled by default?

Select one of the following:

  • A. Local Traffic Log

  • B. Event Logging

Explanation

Question 16 of 22

1

What effect does the CLI command set user—anonymize enable have on traffic and UTM logs?

Select one of the following:

  • A. Sets the user name in the logs to “anonymous”

  • B. Sets the user IP in the logs to ¨N/A¨

Explanation

Question 17 of 22

1

True or False? Menu items that display under Log & Report depend on the incoming logs.

Select one of the following:

  • A. True

  • B. False

Explanation

Question 18 of 22

1

On the FortiGate GUI, log can help you find a specific log entry more efficiently.

Select one of the following:

  • A. details

  • B. filters

Explanation

Question 19 of 22

1

With email alerts, you can trigger alert emails based on or log severity level.

Select one of the following:

  • A. event

  • B. threat weight

Explanation

Question 20 of 22

1

What happens when logs roll?

Select one of the following:

  • A. It lowers the space requirements needed to contain those logs.

  • B. They are uploaded to an FTP server.

Explanation

Question 21 of 22

1

When you download logs on the GUI,...

Select one of the following:

  • A. all logs in the SQL database are downloaded.

  • B. only your current View, including any filters set, are downloaded.

Explanation

Question 22 of 22

1

What does the following CLI command do?
config log disk setting
set upload enable

Select one of the following:

  • A. Configures rolled logs to upload to an FTP server

  • B. Configures rolled logs to upload to any external logging device

Explanation