01. Which two approaches best support severity-based notification routing?
(Choose two.)
a) Page on-call for every incident to ensure coverage
b) Disable email alerts to reduce noise without tuning
c) Create separate notification policies for critical vs medium/low severity
d) Add policy conditions based on incident severity/state
02. An analyst wants to find systems running a specific software version and then pivot to related events. Which analytics capability supports that pivot best?
a) CMDB query combined with event search filtering
b) HA heartbeat election
c) Remediation playbook execution
d) Notification policy escalation only
03. In the Agentless ZTNA with FortiSIEM UEBA and FortiGate use case, which two statements are accurate?
(Choose two.)
a) FortiSIEM replaces FortiGate as the ZTNA enforcement device
b) The integration guide includes a deployment overview and prerequisite concepts
c) FortiSIEM provides FortiGate with IP addresses tied to suspicious or malicious activity
d) The integration requires disabling UEBA to function
04. How are FortiEDR security policies applied to endpoints in most deployments?
a) By assigning the policy to a Collector Group
b) By applying the policy per dashboard widget
c) By embedding the policy in a FortiSIEM query
d) By linking the policy to a FortiWeb server policy
05. Which two statements are true about creating a Communication Control policy?
(Choose two.)
a) A new policy can be created by cloning an existing policy
b) New policies are typically created to assign different behavior to specific Collector Groups
c) Communication Control policies are created only to generate FortiSIEM dashboards
d) Communication Control policies automatically upgrade endpoint agents
06. In FortiEDR playbooks, which category best represents actions that contain or fix an issue (for example, kill process, isolate host, cleanup)?
a) Routing actions
b) UI customization actions
c) License actions
d) Remediation actions
07. Which two outcomes are typical reasons to use aggregation in a rule?
(Choose two.)
a) Require a threshold (N events) before triggering an incident
b) Encrypt search results automatically
c) Reduce noise by correlating repeated activity within a time window
d) Disable CMDB enrichment for matched events
08. When building multi-step investigations, what is the primary advantage of using nested lookups over manual copy/paste of values?
a) It guarantees the query will never return false positives
b) It makes correlation repeatable and less error-prone across searches
c) It automatically blocks matched entities
d) It converts the investigation into a playbook without configuration
09. Which two tasks align directly with the FortiEDR security settings and policies objectives listed for this exam?
(Choose two.)
a) Configure FortiSIEM CMDB database replication
b) Configure communication control policy
c) Configure FortiWeb reverse proxy certificates
d) Configure playbooks
10. If FCS reclassifies a security event after initial classification, where is that reclassification context typically reflected?
a) Only in FortiSIEM CMDB records
b) Only in FortiWeb traffic logs
c) In the event details/overview information associated with the security event
d) Only in the Central Manager server OS syslog