New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Fortinet NSE7_SOC_AR-7.6 Practice Exam with Questions & Answers | Set: 2

Questions 11

Refer to the Exhibit:

An analyst wants to create an incident and generate a report whenever FortiAnalyzer generates a malicious attachment event based on FortiSandbox analysis. The endpoint hosts are protected by FortiClient EMS integrated with FortiSandbox. All devices are logging to FortiAnalyzer.

Which connector must the analyst use in this playbook?

Options:
A.

FortiSandbox connector

B.

FortiClient EMS connector

C.

FortiMail connector

D.

Local connector

Fortinet NSE7_SOC_AR-7.6 Premium Access
Questions 12

Refer to the exhibits.

What can you conclude from analyzing the data using the threat hunting module?

Options:
A.

Spearphishing is being used to elicit sensitive information.

B.

DNS tunneling is being used to extract confidential data from the local network.

C.

Reconnaissance is being used to gather victim identity information from the mail server.

D.

FTP is being used as command-and-control (C&C) technique to mine for data.

Questions 13

Review the incident report:

An attacker identified employee names, roles, and email patterns from public press releases, which were then used to craft tailored emails.

The emails were directed to recipients to review an attached agenda using a link hosted off the corporate domain.

Which two MITRE ATT&CK tactics best fit this report? (Choose two answers)

Options:
A.

Reconnaissance

B.

Discovery

C.

Initial Access

D.

Defense Evasion

Questions 14

Based on the Pyramid of Pain model, which two statements accurately describe the value of an indicator and how difficult it is for an adversary to change? (Choose two answers)

Options:
A.

IP addresses are easy because adversaries can spoof them or move them to new resources.

B.

Tactics, techniques, and procedures are hard because adversaries must adapt their methods.

C.

Artifacts are easy because adversaries can alter file paths or registry keys.

D.

Tools are easy because often, multiple alternatives exist.

Questions 15

Match the FortiSIEM device type to its description. Select each FortiSIEM device type in the left column, hold and drag it to the blank space next to its corresponding description in the column on the right.

NSE7_SOC_AR-7.6 Question 15

Options:
Questions 16

Refer to Exhibit:

You are tasked with reviewing a new FortiAnalyzer deployment in a network with multiple registered logging devices. There is only one FortiAnalyzer in the topology.

Which potential problem do you observe?

Options:
A.

The disk space allocated is insufficient.

B.

The analytics-to-archive ratio is misconfigured.

C.

The analytics retention period is too long.

D.

The archive retention period is too long.

Questions 17

What are three capabilities of the built-in FortiSOAR Jinja editor? (Choose three answers)

Options:
A.

It renders output by combining Jinja expressions and JSON input.

B.

It checks the validity of a Jinja expression.

C.

It creates new records in bulk.

D.

It loads the environment JSON of a recently executed playbook.

E.

It defines conditions to trigger a playbook step.

Exam Code: NSE7_SOC_AR-7.6
Certification Provider: Fortinet
Exam Name: Fortinet NSE 7 - Security Operations 7.6 Architect
Last Update: Jan 5, 2026
Questions: 57
PDF + Testing Engine
$164.99
$49.5
Testing Engine
$124.99
$37.5
PDF (Q&A)
$104.99
$31.5