A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)
What are two different services that you can configure for monitoring system and cluster health statuses on FortiSOAR?
(Choose two.)
Several users have informed you that the FortiSOAR GUI Is not reachable. When troubleshooting, which step should you take first?
View the exhibit. The dataset on FortiSOAR has been trained to predict which record field?
Which two statements about upgrading a FortiSOAR HA cluster are true7 (Choose two.)
Which two statements about appliance users are true? (Choose two.)
When configuring the system proxy on FortiSOAR. which two URLs should be accessible from the proxy server? (Choose two.)
Which two system monitoring reports are available on the System Monitoring widget?
(Choose two.)
An administrator wants to collect and review all FortiSOAR log tiles to troubleshoot an issue. Which two methods can they use to accomplish this? (Choose two.)
Refer to the exhibit.
When importing modules to FortiSOAR using the configuration wizard, what actions are applied to fields it you select Merge with Existing as the Bulk action?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Fortinet Free Exams |
---|
![]() |