Last Updated On : 13-Jan-2026
Total 32 Questions
The smartest way to prepare for your Fortinet FCP_FSM_AN-7.2 exam isn't just reading—it's practicing. Our Fortinet FCP - FortiSIEM 7.2 Analyst practice test bridge gap, transforming your knowledge into a passing score. Familiarize yourself with the exact style and difficulty of the real Fortinet FCP_FSM_AN-7.2 practice questions, so there are no surprises. Get detailed feedback to identify your strengths and target your weaknesses, making your study time more efficient.
How can you query the configuration management database (CMDB) in an analytics search?
A. Click Value > Select from CMDB.
B. On the CMDB tab, select an entry, and then click Create Search.
C. On the Admin tab, click CMDB Search.
D. Click Attribute > Select from CMDB.
Explanation:
In FortiSIEM Analytics, when building a search query, you can incorporate data from the Configuration Management Database (CMDB) to enrich your search with device, user, or service context. The correct method is to:
In the Analytics search interface, click on the Attribute button (or the "+" to add a field).
From the dropdown, select "Select from CMDB".
This opens a dialog where you can choose CMDB attributes (such as device owner, location, asset value, etc.) to include in your search criteria or as displayed columns.
This allows you to filter or group results based on CMDB properties — for example, searching for all events from high-value assets or from a specific business unit.
The other options are incorrect because:
A. Click Value > Select from CMDB
– The Value menu is used for filtering on specific event log values, not for selecting CMDB attributes.
B. On the CMDB tab, select an entry, and then click Create Search
– While there is a CMDB tab in the FortiSIEM interface, its primary purpose is to view and manage CMDB entries, not to directly launch an analytics search. The "Create Search" button in that tab typically creates a search for events related to that CMDB entry, but this is not the standard method for querying the CMDB within an analytics search.
C. On the Admin tab, click CMDB Search
– The Admin tab contains tools for configuring the CMDB (like discovery and rules), not for performing interactive analytics searches.
Reference:
FortiSIEM Analytics Interface – Using CMDB attributes to enrich search queries is a core feature for incident investigation and reporting.
CMDB Integration in Searches – This allows analysts to correlate log data with business context (asset criticality, ownership, location) directly in their investigations.
How does FortiSIEM update the incident table if a performance rule triggers repeatedly?
A. FortiSIEM changes the incident status to Repeated, and updates the Last Seen timestamp.
B. FortiSIEM updates the Incident Count value and Last Seen timestamp.
C. FortiSIEM generates a new incident based on the Rule Frequency value, and updates the First Seen and Last Seen timestamps.
D. FortiSIEM generates a new incident each time the rule triggers, and updates the First Seen and Last Seen timestamps.
Explanation:
For performance rules (also known as threshold or counting rules) in FortiSIEM, the system is designed to aggregate repeated triggers of the same condition on the same device or entity within a configured time window, rather than creating a new incident each time. Here’s how it works:
When a performance rule triggers for the first time on a specific entity, FortiSIEM creates a new incident in the incident table, recording the First Seen time and initial details.
If the same rule triggers again for the same entity before the incident expires (based on the rule's time window or expiry settings), FortiSIEM does not create a duplicate incident.
Instead, it updates the existing incident by:
Incrementing the "Incident Count" field (this shows how many times the rule condition has been met).
Updating the "Last Seen" timestamp to the most recent trigger time.
The First Seen timestamp remains unchanged.
This behavior prevents alert fatigue by consolidating repeated occurrences into a single, trackable incident with an escalating count, giving analysts a clear view of recurrence and frequency.
The other options are incorrect because:
A. There is no standard incident status called "Repeated" in FortiSIEM for this purpose.
C. This describes more of a correlation rule behavior where a new incident instance may be generated based on frequency settings, but for performance rules, the system updates the existing incident's count.
D. This would cause duplicate incidents and alert flooding, which FortiSIEM specifically avoids for performance rules via count aggregation.
Reference:
Performance Rule vs. Correlation Rule Behavior – Performance rules aggregate triggers; correlation rules can generate separate incidents based on sequence or frequency logic.
Incident Lifecycle & Fields – The Incident Count and Last Seen fields are key to tracking repeated performance rule triggers.
Which statement about thresholds is true?
A. FortiSIEM uses fixed, hardcoded global and device thresholds for all performance metrics.
B. FortiSIEM uses only device thresholds for security metrics.
C. FortiSIEM uses global and per device thresholds for performance metrics.
D. FortiSIEM uses only global thresholds for performance metrics.
Explanation:
Thresholds in FortiSIEM are used to determine when a performance metric crosses a defined limit and should generate an alert.
FortiSIEM supports two levels of thresholds:
Global thresholds: These apply across all devices for a given metric (e.g., CPU utilization > 90%).
Per-device thresholds: These can be customized for specific devices, overriding the global threshold when necessary.
This dual approach allows analysts to maintain broad monitoring policies while fine-tuning thresholds for critical or unique devices.
Why the other options are incorrect
A. Fixed, hardcoded global and device thresholds
→ Incorrect. Thresholds are configurable, not hardcoded. Analysts can adjust them in the FortiSIEM UI.
B. Only device thresholds for security metrics
→ Incorrect. Security metrics are not limited to device thresholds; thresholds can be global as well.
D. Only global thresholds for performance metrics
→ Incorrect. Device-specific thresholds exist to provide flexibility.
Reference
From the FortiSIEM 7.2 Administration Guide:
“Thresholds can be defined globally for all devices or overridden at the device level for performance metrics.”
Which analytics search can be used to apply a user and entity behavior analytics (UEBA) tag to an event for a failed login by the user JSmith?
A. User = smith
B. Username NOT END WITH jsmith
C. User IS jsmith
D. Username CONTAIN smit
Explanation:
To apply a UEBA (User and Entity Behavior Analytics) tag to events for a specific user, you must create a precise match in an analytics search filter. The IS operator is used for exact string matching in FortiSIEM analytics.
User IS jsmith – This filter will match events where the User attribute exactly equals "jsmith". This is the correct method to target all failed login events for that specific user account so that a UEBA tag (like Failed_Logon) can be applied to build a behavioral baseline.
UEBA tagging typically requires a well-defined search filter to accurately label relevant events. Exact matching (IS) ensures no unintended events are tagged.
The other options are incorrect because:
A. User = smith –
While = can sometimes be used for equality, the standard exact match operator in FortiSIEM analytics is IS. More importantly, "smith" would not match the full username "jsmith".
B. Username NOT END WITH jsmith –
This would exclude events where the username ends with "jsmith", which is the opposite of the goal.
D. Username CONTAIN smit –
This is too broad. It would match any username containing the substring "smit" (e.g., "jsmith", "asmith", "smithee"), leading to over-tagging and inaccurate UEBA profiling.
Reference:
UEBA Configuration in FortiSIEM – UEBA relies on accurate event tagging to model normal behavior and detect anomalies.
Analytics Search Operators – Understanding operators like IS, CONTAIN, END WITH, and NOT is essential for building precise filters for rules and tagging.
What can you use to send data to FortiSIEM for user and entity behavior analytics (UEBA)?
A. FortiSIEM agent
B. SSH
C. SNMP
D. FortiSIEM worker
Explanation:
For User and Entity Behavior Analytics (UEBA), FortiSIEM needs detailed event logs that include user identities and their associated actions (logons, file access, command execution, etc.). The FortiSIEM Agent (also known as the Windows Agent or Log Forwarder) is specifically designed to collect and forward such rich, identity-aware logs from endpoints and servers to FortiSIEM.
FortiSIEM Agent runs on Windows and Linux systems and can collect:
Windows Security Event Logs (critical for tracking user authentication and activity)
Syslog from applications
Custom script outputs
It enriches logs with user context, which is essential for building accurate UEBA baselines and detecting anomalous user behavior.
The agent ensures reliable, structured log delivery with the necessary fields (like UserName, TargetUserName, EventID) that UEBA models require to correlate actions to specific users and entities.
The other options are incorrect because:
B. SSH
– This is a protocol for secure remote access, not a standard log collection method for UEBA. While FortiSIEM can execute scripts over SSH to pull data, it is not the primary or specialized method for collecting the identity-focused logs required for UEBA.
C. SNMP
– Simple Network Management Protocol is used for collecting device performance metrics (CPU, memory, interface stats), not for user-behavior event logs. SNMP traps lack the detailed user-action context needed for UEBA.
D. FortiSIEM worker
– A Worker node is part of FortiSIEM's distributed architecture for processing events and analytics; it is not a data collection component. Collectors (and agents reporting to Collectors) are responsible for ingesting data.
Reference:
FortiSIEM Data Collection Architecture – Agents are the recommended method for collecting detailed logs from endpoints, especially Windows events, for security monitoring and UEBA.
UEBA Prerequisites – Successful UEBA deployment depends on ingesting logs that contain user identifiers and action details, which agents are optimized to provide.
Which running mode takes the most time to perform machine learning tasks?
A. Local auto
B. Local
C. Forecasting
D. Regression
Explanation:
In FortiSIEM, machine learning (ML) analytics can operate in several modes depending on the type of pattern analysis required. Among these modes, Local auto takes the longest time to complete ML tasks because it involves an additional layer of automated model evaluation. When Local auto is selected, FortiSIEM does not immediately run a specific ML model. Instead, it first analyzes the dataset, determines the best suitable model type, evaluates multiple options, and then executes the final ML process. This auto-selection phase increases the overall computation time, making Local auto the slowest among all available modes. FortiSIEM documentation highlights that automated model selection introduces more overhead due to internal evaluation cycles before actual training or pattern analysis begins.
Why other options are not correct:
B. Local
Local mode executes a predefined model without the need for auto-selection. Because no evaluation of multiple model structures occurs, it completes ML tasks faster compared to Local auto. It runs directly on the local worker and only processes the selected dataset with a fixed model type.
C. Forecasting
Forecasting mode uses a time-series-based prediction model tailored for trend or metric forecasting. It applies a focused algorithm that does not require multiple model evaluations. As a result, it finishes more quickly than Local auto because the ML workflow is narrower and does not include automatic feature or model selection.
D. Regression
Regression applies a defined regression model, typically linear or polynomial, with no auto-evaluation phase. Since regression calculations are simpler and involve predefined variable relationships, this mode consumes significantly less processing time than Local auto.
References
FortiSIEM 7.2 Administration Guide – Machine Learning Analytics Modes
FortiSIEM Analytics and ML Technical Note – Local vs. Auto ML Mode Behavior
Which information can FortiSIEM retrieve from FortiClient EMS through an API connection?
A. Host software versions
B. FortiSIEM license
C. Host login credentials
D. ZTNA tags
Explanation:
FortiSIEM integrates with FortiClient EMS (Endpoint Management Server) via API primarily to enrich endpoint data with dynamic context for improved monitoring and Zero Trust Network Access (ZTNA) enforcement.
ZTNA Tags are key-value pairs (such as OS=Windows11, Department=Finance, Compliance=Passed) assigned to endpoints in FortiClient EMS based on their security posture, software inventory, user identity, or group membership.
Through the API connection, FortiSIEM can retrieve these ZTNA tags and map them to the corresponding hosts in its CMDB (Configuration Management Database). This enables:
Enriching security events with endpoint context (e.g., alerting if a non-compliant device accesses sensitive resources).
Creating dynamic rules and dashboards based on endpoint tags.
Supporting ZTNA policies by providing real-time endpoint posture information.
The other options are incorrect because:
A. Host software versions
– While FortiClient EMS does collect software inventory, the primary data exchanged via the API for security integration is the tag information (which may be derived from software versions). The API is optimized for tag synchronization, not raw inventory dumps.
B. FortiSIEM license
– Licensing is managed entirely within FortiSIEM or the Fortinet support portal, not through FortiClient EMS.
C. Host login credentials
– Credentials are never shared via API for security and compliance reasons. FortiSIEM does not retrieve passwords or credentials from EMS.
Reference:
FortiSIEM and FortiClient EMS Integration
– The integration is designed to populate the CMDB with dynamic endpoint tags from EMS for enhanced visibility and policy-based monitoring.
| Page 1 out of 5 Pages |
Choosing the right preparation material is critical for passing the Fortinet FCP - FortiSIEM 7.2 Analyst exam. Here’s how our FCP_FSM_AN-7.2 practice test is designed to bridge the gap between knowledge and a passing score.