New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

NSE7_SOC_AR-7.6 Exam Dumps - Fortinet Certified Professional Security Operations Questions and Answers

Question # 4

What are three capabilities of the built-in FortiSOAR Jinja editor? (Choose three answers)

Options:

A.

It renders output by combining Jinja expressions and JSON input.

B.

It checks the validity of a Jinja expression.

C.

It creates new records in bulk.

D.

It loads the environment JSON of a recently executed playbook.

E.

It defines conditions to trigger a playbook step.

Buy Now
Question # 5

While monitoring your network, you discover that one FortiGate device is sending significantly more logs to FortiAnalyzer than all of the other FortiGate devices in the topology.

Additionally, the ADOM that the FortiGate devices are registered to consistently exceeds its quota.

What are two possible solutions? (Choose two.)

Options:

A.

Increase the storage space quota for the first FortiGate device.

B.

Create a separate ADOM for the first FortiGate device and configure a different set of storage policies.

C.

Reconfigure the first FortiGate device to reduce the number of logs it forwards to FortiAnalyzer.

D.

Configure data selectors to filter the data sent by the first FortiGate device.

Buy Now
Question # 6

Refer to the exhibits.

You configured a custom event handler and an associated rule to generate events whenever FortiMail detects spam emails. However, you notice that the event handler is generating events for both spam emails and clean emails.

Which change must you make in the rule so that it detects only spam emails?

Options:

A.

In the Log Type field, select Anti-Spam Log (spam)

B.

In the Log filter by Text field, type type==spam.

C.

Disable the rule to use the filter in the data selector to create the event.

D.

In the Trigger an event when field, select Within a group, the log field Spam Name (snane) has 2 or more unique values.

Buy Now
Question # 7

Which two statements about the FortiAnalyzer Fabric topology are true? (Choose two.)

Options:

A.

Downstream collectors can forward logs to Fabric members.

B.

Logging devices must be registered to the supervisor.

C.

The supervisor uses an API to store logs, incidents, and events locally.

D.

Fabric members must be in analyzer mode.

Buy Now
Question # 8

Refer to the exhibits.

What can you conclude from analyzing the data using the threat hunting module?

Options:

A.

Spearphishing is being used to elicit sensitive information.

B.

DNS tunneling is being used to extract confidential data from the local network.

C.

Reconnaissance is being used to gather victim identity information from the mail server.

D.

FTP is being used as command-and-control (C&C) technique to mine for data.

Buy Now
Question # 9

You are trying to create a playbook that creates a manual task showing a list of public IPv6 addresses. You were successful in extracting all IP addresses from a previous action into a variable calledip_list, which contains both private and public IPv4 and IPv6 addresses. You must now filter the results to display only public IPv6 addresses. Which two Jinja expressions can accomplish this task? (Choose two answers)

Options:

A.

{{ vars.ip_list | ipv6addr('public') }}

B.

{{ vars.ip_list | ipaddr('public') | ipv6 }}

C.

{{ vars.ip_list | ipaddr('!private') | ipv6 }}

D.

{{ vars.ip_list | ipv6 | ipaddr('public') }}

Buy Now
Question # 10

Which two ways can you create an incident on FortiAnalyzer? (Choose two answers)

Options:

A.

Using a custom event handler

B.

Using a connector action

C.

Manually, on the Event Monitor page

D.

By running a playbook

Buy Now
Question # 11

Which two ways can you create an incident on FortiAnalyzer? (Choose two.)

Options:

A.

Using a connector action

B.

Manually, on the Event Monitor page

C.

By running a playbook

D.

Using a custom event handler

Buy Now
Question # 12

Review the incident report:

An attacker identified employee names, roles, and email patterns from public press releases, which were then used to craft tailored emails.

The emails were directed to recipients to review an attached agenda using a link hosted off the corporate domain.

Which two MITRE ATT&CK tactics best fit this report? (Choose two answers)

Options:

A.

Reconnaissance

B.

Discovery

C.

Initial Access

D.

Defense Evasion

Buy Now
Question # 13

Which FortiAnalyzer connector can you use to run automation stitches9

Options:

A.

FortiCASB

B.

FortiMail

C.

Local

D.

FortiOS

Buy Now
Exam Code: NSE7_SOC_AR-7.6
Exam Name: Fortinet NSE 7 - Security Operations 7.6 Architect
Last Update: Jan 4, 2026
Questions: 57
NSE7_SOC_AR-7.6 pdf

NSE7_SOC_AR-7.6 PDF

$25.5  $84.99
NSE7_SOC_AR-7.6 Engine

NSE7_SOC_AR-7.6 Testing Engine

$28.5  $94.99
NSE7_SOC_AR-7.6 PDF + Engine

NSE7_SOC_AR-7.6 PDF + Testing Engine

$40.5  $134.99