Which two statements accurately describe the process to create a new rule from a search using FortiSIEM analytics? (Choose two.)
AAll search filter rows are added into a single subpattern.
BThe default aggregate condition will always be COUNT (Matched Events) >= 1.
CThe incident action is automatically configured based on the event type.
DRaw event logs cannot be used for incident rule creation.
Review the incident report.
An attacker identified employee names, roles, and email patterns from public press releases, which were then used to craft tailored emails. The emails were directed to recipients to review an attached agenda using a link hosted off the corporate domain.
Which two MITRE ATT&CK tactics best fit this report? (Choose two.)
ADiscovery
BInitial Access
CDefense Evasion
DReconnaissance
Refer to the exhibit.
How do you add a piece of evidence to the Action Logs Marked As Evidence area?
ABy creating an evidence collection task and attaching a file
BBy linking an indicator to the war room
CBy tagging output or a workspace comment with the keyword Evidence
DBy executing a playbook with the Save Execution Logs option enabled
Review the incident report.
Packet captures show a host maintaining periodic TLS sessions that imitate normal HTTPS traffic but run on TCP 8443 to a single external host. An analyst flags the traffic as potential command-and-control. During the same period, the host issues frequent DNS queries with oversized TXT payloads to an attacker-controlled domain, transferring staged files.
Which two MITRE ATT&CK techniques best describe this activity? (Choose two.)
AExploitation of Remote Services
BNon-Standard Port
CExfiltration Over Alternative Protocol
DHide Artifacts
A partner organization recently had sensitive data exfiltrated by a well-known adversary group. You are tasked with threat hunting to see your organization is also affected.
Which action must you take first?
AUse threat intelligence to enrich the IP addresses of all destinations.
BReview the tactics, techniques, and procedures of the adversary.
CUse a packet analyzer to capture and review all traffic flows on critical devices.
DReview historical logs to establish a baseline for normal bandwidth usage.
You are trying to create a playbook that creates a manual task that shows a list of public IPv6 addresses.
You were successful in extracting all IP addresses om a previous action into a variable called ip_list, which has a mix of private and public IPv4 and IPv6 addresses. Now, you must filter the results to display only public IPv6 addresses.
Which two Jinja expressions can accomplish this task? (Choose two.)
A{{ vars.ip_list | ipaddr(!private) | ipv6 }}
B{{ vars.ip_list | ipv6 | ipaddr(‘public’) }}
C{{ vars.ip_list | ipv6addr(‘public’) }}
D{{ vars.ip_list | ipaddr(‘public’) | ipv6 }}
You want to automate a workflow on FortiSOAR so that whenever an incident with critical severity is moved to the containment phase, it is automatically reassigned to an L3 analyst as the incident lead.
Which two steps will accomplish this task? (Choose two.)
ACreate a Find Record step to find matching incidents.
BCreate a Condition step to check the incident phase and update the incident lead.
CCreate an Update Record step to set the incident lead.
DCreate an On Update trigger with trigger conditions that match the containment phase and critical severity.
ESet the playbook schedule to run persistently.
Refer to the exhibit.
You must configure the FortiGate connector to allow FortiSOAR to perform actions on a firewall. However, the connection fails.
Which two configurations are required? (Choose two.)
ATrusted hosts must be enabled and the FortiSOAR IP address must be permitted.
BAn API administrator must be created on FortiGate with the appropriate profile, along with a generated API key to configure on the connector.
CThe VDOM name must be specified, or set to VDOM_1, if VDOMs are not enabled on FortiGate.
DHTTPS must be enabled on the FortiGate interface that FortiSOAR will communicate with.
DRAG DROP -
Match the FortiSIEM device type to its description.
Select each FortiSIEM device type in the left column, hold and drag it to the blank space next to its corresponding description in the column on the right. Once you match a device type to its description, you can move it again if you want to change your answer by clicking on the device type name. You need to match four device types to its description in the work area.
When configuring an Ingest Bulk Feed playbook step, which two restrictions must you consider? (Choose two.)
AIt will not trigger On Create triggers.
BIt is slower than the Create Record step.
CIt will not trigger On Update triggers.
DIt cannot use step output from a connector action.
When you use a manual trigger to save user input as a variable, what is the correct Jinja expression to reference the variable?
A{{ vars.item.<variable_name> }}
B{{ vars.input.params.<variable_name> }}
C{{ globalVars.<variable_name> }}
D{{ vars.steps.<variable_name> }}
What are three capabilities of the built-in FortiSOAR Jinja editor? (Choose three.)
AIt renders output by combining Jinja expressions and JSON input.
BIt checks the validity of a Jinja expression.
CIt loads the environment JSON of a recently executed playbook.
DIt defines conditions to trigger a playbook step.
EIt creates new records in bulk.
Refer to the exhibit.
What are the two mistakes in the incident subpattern rule configuration? (Choose two.)
AThe aggregate operator is incorrect.
BThe Group By attributes conflict with each other.
CThe subpattern is missing a time window definition.
DThe mandatory Event Type attribute is missing.
Which three factors does the FortiSIEM rules engine use to determine the count when it evaluates the aggregate condition COUNT (Matched Events) on a specific subpattern? (Choose three.)
AData source
BGroup By attributes
CIncident action
DTime window
ESearch filter
Which three statements accurately describe step utilities in a playbook step? (Choose three.)
AThe Mock Output step utility uses HTML format to simulate real outputs.
BThe Loop step utility can only be used once in each playbook step.
CThe Condition step utility behavior changes depending on if a loop exists for that step.
DThe Timeout step utility sets a maximum execution time for the step and terminates playbook execution, if exceeded.
EThe Variables step utility stores the output of the step directly in the step itself.
Refer to the exhibit.
Based on the configuration shown in the exhibit, what are two misconfigurations? (Choose two.)
AThe time window should be lowered from 900 seconds to reduce false positives.
BThe subpattern relationships between FailedLogin and FailedLogin2 should be removed.
CA logical operator is missing in the SuccessLogin subpattern to evaluate the subpattern relationships.
DThe SuccessLogin subpattern is not correlated with any FailedLogin or FailedLogin2 attributes.