FCSS_SOC_AN-7.4 Actual Exam Questions

Last updated on June 13, 2025.
Vendor:Fortinet
Exam Code:FCSS_SOC_AN-7.4
Exam Name:FCSS - Security Operations 7.4 Analyst
Exam Questions:27
 

Topic 1 - Exam A

Question #1 Topic 1

According to the National Institute of Standards and Technology (NIST) cybersecurity framework, incident handling activities can be divided into phases.
In which incident handling phase do you quarantine a compromised host in order to prevent an adversary from using it as a stepping stone to the next phase of an attack?

  • A. Containment
  • B. Recovery
  • C. Analysis
  • D. Eradication
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #2 Topic 1

Refer to the exhibit.

You are tasked with reviewing a new FortiAnalyzer deployment in a network with multiple registered logging devices. There is only one FortiAnalyzer in the topology.
Which potential problem do you observe?

  • A. The archive retention period is too long.
  • B. The analytics-to-archive ratio is misconfigured.
  • C. The disk space allocated is insufficient.
  • D. The analytics retention period is too long.
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #3 Topic 1

While monitoring your network, you discover that one FortiGate device is sending significantly more logs to FortiAnalyzer than all of the other FortiGate devices in the topology.
Additionally, the ADOM that the FortiGate devices are registered to consistently exceeds its quota.
What are two possible solutions? (Choose two.)

  • A. Reconfigure the first FortiGate device to reduce the number of logs it forwards to FortiAnalyzer.
  • B. Increase the storage space quota for the first FortiGate device.
  • C. Configure data selectors to filter the data sent by the first FortiGate device.
  • D. Create a separate ADOM for the first FortiGate device and configure a different set of storage policies.
Reveal Solution Hide Solution   Discussion  

Correct Answer: AD 🗳️

Question #4 Topic 1

Which role does a threat hunter play within a SOC?

  • A. Investigate and respond to a reported security incident
  • B. Monitor network logs to identify anomalous behavior
  • C. Collect evidence and determine the impact of a suspected attack
  • D. Search for hidden threats inside a network which may have eluded detection
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

file Viewing page 1 out of 7 pages.
Viewing questions 1-4 out of 27 questions
Next Questions
Browse atleast 50% to increase passing rate cup
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Loading ...