Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam FCSS_SOC_AN-7.4 Topic 4 Question 6 Discussion

Actual exam question for Fortinet's FCSS_SOC_AN-7.4 exam
Question #: 6
Topic #: 4
[All FCSS_SOC_AN-7.4 Questions]

Which three end user logs does FortiAnalyzer use to identify possible IOC compromised hosts? (Choose three.)

Show Suggested Answer Hide Answer
Suggested Answer: B, D, E

Overview of Indicators of Compromise (IoCs): Indicators of Compromise (IoCs) are pieces of evidence that suggest a system may have been compromised. These can include unusual network traffic patterns, the presence of known malicious files, or other suspicious activities.

FortiAnalyzer's Role: FortiAnalyzer aggregates logs from various Fortinet devices to provide comprehensive visibility and analysis of network events. It uses these logs to identify potential IoCs and compromised hosts.

Relevant Log Types:

DNS Filter Logs:

DNS requests are a common vector for malware communication. Analyzing DNS filter logs helps in identifying suspicious domain queries, which can indicate malware attempting to communicate with command and control (C2) servers.


IPS Logs:

Intrusion Prevention System (IPS) logs detect and block exploit attempts and malicious activities. These logs are critical for identifying compromised hosts based on detected intrusion attempts or behaviors matching known attack patterns.

Web Filter Logs:

Web filtering logs monitor and control access to web content. These logs can reveal access to malicious websites, download of malware, or other web-based threats, indicating a compromised host.

Why Not Other Log Types:

Email Filter Logs:

While important for detecting phishing and email-based threats, they are not as directly indicative of compromised hosts as DNS, IPS, and Web filter logs.

Application Filter Logs:

These logs control application usage but are less likely to directly indicate compromised hosts compared to the selected logs.

Detailed Process:

Step 1: FortiAnalyzer collects logs from FortiGate and other Fortinet devices.

Step 2: DNS filter logs are analyzed to detect unusual or malicious domain queries.

Step 3: IPS logs are reviewed for any intrusion attempts or suspicious activities.

Step 4: Web filter logs are checked for access to malicious websites or downloads.

Step 5: FortiAnalyzer correlates the information from these logs to identify potential IoCs and compromised hosts.

Fortinet Documentation: FortiOS DNS Filter, IPS, and Web Filter administration guides.

FortiAnalyzer Administration Guide: Details on log analysis and IoC identification.

By using DNS filter logs, IPS logs, and Web filter logs, FortiAnalyzer effectively identifies possible compromised hosts, providing critical insights for threat detection and response.

Contribute your Thoughts:

Ashleigh
15 days ago
I think Application filter logs may not be as relevant as the other options. It's more about network traffic analysis.
upvoted 0 times
...
Maile
16 days ago
I'm not sure about Application filter logs. Do they really help in identifying IOC compromised hosts?
upvoted 0 times
...
Tish
17 days ago
D, E, and... let's see, B for the DNS filter logs. Gotta catch those pesky domain name scavengers!
upvoted 0 times
Gracia
2 days ago
Definitely, E for Web filter logs is crucial for monitoring internet activity.
upvoted 0 times
...
Felix
11 days ago
I think D for IPS logs is important too. Can't forget about potential intrusions.
upvoted 0 times
...
...
Madonna
19 days ago
I agree with Ashleigh. Those logs can help identify compromised hosts.
upvoted 0 times
...
Ashleigh
28 days ago
I think FortiAnalyzer uses DNS filter logs, IPS logs, and Web filter logs.
upvoted 0 times
...
Doug
1 months ago
Hmm, IPS logs, web filters, and DNS filters... Looks like a classic case of the IT department trying to catch the 'I Pee Softly' virus.
upvoted 0 times
...
Raul
1 months ago
Let's see, IOC compromised hosts... I'd go with A, D, and E. Can't go wrong with the full cybersecurity alphabet soup, right?
upvoted 0 times
...
Sanjuana
1 months ago
D, E, and IPS logs? Sounds like a hacker's dream team!
upvoted 0 times
Jina
23 hours ago
Yes, you're right! FortiAnalyzer uses IPS logs, Web filter logs, and Email filter logs.
upvoted 0 times
...
...

Save Cancel