New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Fortinet NSE7_SOC_AR-7.6 Practice Exam with Questions & Answers

Questions 1

Which statement describes automation stitch integration between FortiGate and FortiAnalyzer?

Options:
A.

An event handler on FortiAnalyzer executes an automation stitch when an event is created.

B.

An automation stitch is configured on FortiAnalyzer and mapped to FortiGate using the FortiOS connector.

C.

An event handler on FortiAnalyzer is configured to send a notification to FortiGate to trigger an automation stitch.

D.

A security profile on FortiGate triggers a violation and FortiGate sends a webhook call to FortiAnalyzer.

Fortinet NSE7_SOC_AR-7.6 Premium Access
Questions 2

Which two ways can you create an incident on FortiAnalyzer? (Choose two.)

Options:
A.

Using a connector action

B.

Manually, on the Event Monitor page

C.

By running a playbook

D.

Using a custom event handler

Questions 3

When configuring a FortiAnalyzer to act as a collector device, which two steps must you perform? (Choose two.)

Options:
A.

Enable log compression.

B.

Configure log forwarding to a FortiAnalyzer in analyzer mode.

C.

Configure the data policy to focus on archiving.

D.

Configure Fabric authorization on the connecting interface.

Questions 4

Refer to the exhibit.

You notice that the custom event handler you configured to detect SMTP reconnaissance activities is creating a large number of events. This is overwhelming your notification system.

How can you fix this?

Options:
A.

Increase the trigger count so that it identifies and reduces the count triggered by a particular group.

B.

Disable the custom event handler because it is not working as expected.

C.

Decrease the time range that the custom event handler covers during the attack.

D.

Increase the log field value so that it looks for more unique field values when it creates the event.

Questions 5

Refer to the exhibits.

You configured a spearphishing event handler and the associated rule. However. FortiAnalyzer did not generate an event.

When you check the FortiAnalyzer log viewer, you confirm that FortiSandbox forwarded the appropriate logs, as shown in the raw log exhibit.

What configuration must you change on FortiAnalyzer in order for FortiAnalyzer to generate an event?

Options:
A.

In the Log Type field, change the selection to AntiVirus Log(malware).

B.

Configure a FortiSandbox data selector and add it tothe event handler.

C.

In the Log Filter by Text field, type the value: .5 ub t ype ma Iwa re..

D.

Change trigger condition by selecting. Within a group, the log field Malware Kame (mname> has 2 or more unique values.

Questions 6

Which three statements accurately describe step utilities in a playbook step? (Choose three answers)

Options:
A.

The Timeout step utility sets a maximum execution time for the step and terminates playbook execution if exceeded.

B.

The Loop step utility can only be used once in each playbook step.

C.

The Variables step utility stores the output of the step directly in the step itself.

D.

The Condition step utility behavior changes depending on if a loop exists for that step.

E.

The Mock Output step utility uses HTML format to simulate real outputs.

Questions 7

Which FortiAnalyzer connector can you use to run automation stitches9

Options:
A.

FortiCASB

B.

FortiMail

C.

Local

D.

FortiOS

Questions 8

According to the National Institute of Standards and Technology (NIST) cybersecurity framework, incident handling activities can be divided into phases.

In which incident handling phase do you quarantine a compromised host in order to prevent an adversary from using it as a stepping stone to the next phase of an attack?

Options:
A.

Containment

B.

Analysis

C.

Eradication

D.

Recovery

Questions 9

Refer to the exhibits.

You configured a custom event handler and an associated rule to generate events whenever FortiMail detects spam emails. However, you notice that the event handler is generating events for both spam emails and clean emails.

Which change must you make in the rule so that it detects only spam emails?

Options:
A.

In the Log Type field, select Anti-Spam Log (spam)

B.

In the Log filter by Text field, type type==spam.

C.

Disable the rule to use the filter in the data selector to create the event.

D.

In the Trigger an event when field, select Within a group, the log field Spam Name (snane) has 2 or more unique values.

Questions 10

Review the following incident report:

Attackers leveraged a phishing email campaign targeting your employees.

The email likely impersonated a trusted source, such as the IT department, and requested login credentials.

An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).

The RAT provided the attackers with remote access and a foothold in the compromised system.

Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)

Options:
A.

Initial Access

B.

Defense Evasion

C.

Lateral Movement

D.

Persistence

Exam Code: NSE7_SOC_AR-7.6
Certification Provider: Fortinet
Exam Name: Fortinet NSE 7 - Security Operations 7.6 Architect
Last Update: Jan 5, 2026
Questions: 57
PDF + Testing Engine
$164.99
$49.5
Testing Engine
$124.99
$37.5
PDF (Q&A)
$104.99
$31.5