New Year Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Fortinet NSE 7 - Security Operations 7.6 Architect Question and Answers

Fortinet NSE 7 - Security Operations 7.6 Architect

Last Update Jan 14, 2026
Total Questions : 57

We are offering FREE NSE7_SOC_AR-7.6 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare NSE7_SOC_AR-7.6 free exam questions and then go for complete pool of Fortinet NSE 7 - Security Operations 7.6 Architect test questions that will help you more.

NSE7_SOC_AR-7.6 pdf

NSE7_SOC_AR-7.6 PDF

$36.75  $104.99
NSE7_SOC_AR-7.6 Engine

NSE7_SOC_AR-7.6 Testing Engine

$43.75  $124.99
NSE7_SOC_AR-7.6 PDF + Engine

NSE7_SOC_AR-7.6 PDF + Testing Engine

$57.75  $164.99
Questions 1

Refer to the exhibits.

You configured a custom event handler and an associated rule to generate events whenever FortiMail detects spam emails. However, you notice that the event handler is generating events for both spam emails and clean emails.

Which change must you make in the rule so that it detects only spam emails?

Options:

A.  

In the Log Type field, select Anti-Spam Log (spam)

B.  

In the Log filter by Text field, type type==spam.

C.  

Disable the rule to use the filter in the data selector to create the event.

D.  

In the Trigger an event when field, select Within a group, the log field Spam Name (snane) has 2 or more unique values.

Discussion 0
Questions 2

Refer to the exhibit.

How do you add a piece of evidence to the Action Logs Marked As Evidence area? (Choose one answer)

Options:

A.  

By tagging output or a workspace comment with the keyword Evidence

B.  

By linking an indicator to the war room

C.  

By creating an evidence collection task and attaching a file

D.  

By executing a playbook with the Save Execution Logs option enabled

Discussion 0
Questions 3

While monitoring your network, you discover that one FortiGate device is sending significantly more logs to FortiAnalyzer than all of the other FortiGate devices in the topology.

Additionally, the ADOM that the FortiGate devices are registered to consistently exceeds its quota.

What are two possible solutions? (Choose two.)

Options:

A.  

Increase the storage space quota for the first FortiGate device.

B.  

Create a separate ADOM for the first FortiGate device and configure a different set of storage policies.

C.  

Reconfigure the first FortiGate device to reduce the number of logs it forwards to FortiAnalyzer.

D.  

Configure data selectors to filter the data sent by the first FortiGate device.

Discussion 0
Questions 4

Refer to the exhibit.

You are reviewing the Triggering Events page for a FortiSIEM incident. You want to remove the Reporting IP column because you have only one firewall in the topology. How do you accomplish this? (Choose one answer)

Options:

A.  

Clear the Reporting IP field from the Triggered Attributes section when you configure the Incident Action.

B.  

Disable correlation for the Reporting IP field in the rule subpattern.

C.  

Remove the Reporting IP attribute from the raw logs using parsing rules.

D.  

Customize the display columns for this incident.

Discussion 0
Questions 5

Refer to the exhibit.

You are trying to find traffic flows to destinations that are in Europe or Asia, for hosts in the local LAN segment. However, the query returns no results. Assume these logs exist on FortiSIEM.

Which three mistakes can you see in the query shown in the exhibit? (Choose three answers)

Options:

A.  

The null value cannot be used with the IS NOT operator.

B.  

The time range must be Absolute for queries that use configuration management database (CMDB) groups.

C.  

There are missing parentheses between the first row (Group: Europe) and the second row (Group: Asia).

D.  

The Source IP row operator must be BETWEEN 10.0.0.0, 10.200.200.254.

E.  

The logical operator for the first row (Group: Europe) must be OR.

Discussion 0
Questions 6

Which three statements accurately describe step utilities in a playbook step? (Choose three answers)

Options:

A.  

The Timeout step utility sets a maximum execution time for the step and terminates playbook execution if exceeded.

B.  

The Loop step utility can only be used once in each playbook step.

C.  

The Variables step utility stores the output of the step directly in the step itself.

D.  

The Condition step utility behavior changes depending on if a loop exists for that step.

E.  

The Mock Output step utility uses HTML format to simulate real outputs.

Discussion 0
Questions 7

You are trying to create a playbook that creates a manual task showing a list of public IPv6 addresses. You were successful in extracting all IP addresses from a previous action into a variable calledip_list, which contains both private and public IPv4 and IPv6 addresses. You must now filter the results to display only public IPv6 addresses. Which two Jinja expressions can accomplish this task? (Choose two answers)

Options:

A.  

{{ vars.ip_list | ipv6addr('public') }}

B.  

{{ vars.ip_list | ipaddr('public') | ipv6 }}

C.  

{{ vars.ip_list | ipaddr('!private') | ipv6 }}

D.  

{{ vars.ip_list | ipv6 | ipaddr('public') }}

Discussion 0
Questions 8

When configuring a FortiAnalyzer to act as a collector device, which two steps must you perform? (Choose two.)

Options:

A.  

Enable log compression.

B.  

Configure log forwarding to a FortiAnalyzer in analyzer mode.

C.  

Configure the data policy to focus on archiving.

D.  

Configure Fabric authorization on the connecting interface.

Discussion 0
Questions 9

Which two best practices should be followed when exporting playbooks in FortiAnalyzer? (Choose two answers)

Options:

A.  

Disable playbooks before exporting them.

B.  

Include the associated connector settings.

C.  

Move playbooks between ADOMs rather than exporting playbooks and re-importing them.

D.  

Ensure the exported playbook’s names do not exist in the target ADOM.

Discussion 0
Questions 10

Refer to the exhibits.

The Malicious File Detect playbook is configured to create an incident when an event handler generates a malicious file detection event.

Why did the Malicious File Detect playbook execution fail?

Options:

A.  

The Create Incident task was expecting a name or number as input, but received an incorrect data format

B.  

The Get Events task did not retrieve any event data.

C.  

The Attach_Data_To_lncident incident task wasexpecting an integer, but received an incorrect data format.

D.  

The Attach Data To Incident task failed, which stopped the playbook execution.

Discussion 0
Questions 11

Refer to the Exhibit:

An analyst wants to create an incident and generate a report whenever FortiAnalyzer generates a malicious attachment event based on FortiSandbox analysis. The endpoint hosts are protected by FortiClient EMS integrated with FortiSandbox. All devices are logging to FortiAnalyzer.

Which connector must the analyst use in this playbook?

Options:

A.  

FortiSandbox connector

B.  

FortiClient EMS connector

C.  

FortiMail connector

D.  

Local connector

Discussion 0
Questions 12

Which statement describes automation stitch integration between FortiGate and FortiAnalyzer?

Options:

A.  

An event handler on FortiAnalyzer executes an automation stitch when an event is created.

B.  

An automation stitch is configured on FortiAnalyzer and mapped to FortiGate using the FortiOS connector.

C.  

An event handler on FortiAnalyzer is configured to send a notification to FortiGate to trigger an automation stitch.

D.  

A security profile on FortiGate triggers a violation and FortiGate sends a webhook call to FortiAnalyzer.

Discussion 0
Questions 13

Using the default data ingestion wizard in FortiSOAR, place the incident handling workflow from FortiSIEM to FortiSOAR in the correct sequence. Select each workflow component in the left column, hold and drag it to a blank position in the column on the right. Place the four correct workflow components in order, placing the first step in the first position at the top of the column.

Options:

Discussion 0
Questions 14

Which two statements about the FortiAnalyzer Fabric topology are true? (Choose two.)

Options:

A.  

Downstream collectors can forward logs to Fabric members.

B.  

Logging devices must be registered to the supervisor.

C.  

The supervisor uses an API to store logs, incidents, and events locally.

D.  

Fabric members must be in analyzer mode.

Discussion 0
Questions 15

Refer to the exhibits.

You configured a spearphishing event handler and the associated rule. However. FortiAnalyzer did not generate an event.

When you check the FortiAnalyzer log viewer, you confirm that FortiSandbox forwarded the appropriate logs, as shown in the raw log exhibit.

What configuration must you change on FortiAnalyzer in order for FortiAnalyzer to generate an event?

Options:

A.  

In the Log Type field, change the selection to AntiVirus Log(malware).

B.  

Configure a FortiSandbox data selector and add it tothe event handler.

C.  

In the Log Filter by Text field, type the value: .5 ub t ype ma Iwa re..

D.  

Change trigger condition by selecting. Within a group, the log field Malware Kame (mname> has 2 or more unique values.

Discussion 0
Questions 16

Which three end user logs does FortiAnalyzer use to identify possible IOC compromised hosts? (Choose three answers)

Options:

A.  

Web filter logs1

B.  

Email filter logs

C.  

DNS filter logs2

D.  

Application filter logs

E.  

IPS logs

Discussion 0
Questions 17

Refer to Exhibit:

A SOC analyst is designing a playbook to filter for a high severity event and attach the event information to an incident.

Which local connector action must the analyst use in this scenario?

Options:

A.  

Get Events

B.  

Update Incident

C.  

Update Asset and Identity

D.  

Attach Data to Incident

Discussion 0