Which three activities can be achieved using the FortiSOAR queue and shift management feature? (Choose three)
Which two statements about Elasticsearch are true? (Choose two.)
Which two system monitoring reports are available on the System Monitoring widget?
(Choose two.)
What are two system-level logs that can be purged using application configuration? (Choose two.)
A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)
Which service on FortiSOAR is the playbook scheduler?
Refer to the exhibit.
The former primary node was relegated to the secondary rote but is stuck in the Faulted state.
Which two steps must you take to restore operation in the high availability (HA) cluster? (Choose two.)
Refer to the exhibit.
When importing modules to FortiSOAR using the configuration wizard, what actions are applied to fields it you select Merge with Existing as the Bulk action?
Which two statements about appliance users are true? (Choose two.)
For which two modules on FortiSOAR can you create SLA templates7 (Choose two.)
Select two statements that are true about FortiSOAR themes.
(Choose two.)