Last Updated On : 13-Jan-2026
Total 64 Questions
The smartest way to prepare for your Fortinet NSE5_FSM-6.3 exam isn't just reading—it's practicing. Our Fortinet NSE 5 - FortiSIEM 6.3 practice test bridge gap, transforming your knowledge into a passing score. Familiarize yourself with the exact style and difficulty of the real Fortinet NSE5_FSM-6.3 practice questions, so there are no surprises. Get detailed feedback to identify your strengths and target your weaknesses, making your study time more efficient.
What is a prerequisite for FortiSIEM Linux agent installation?
A. The web server must be installed on the Linux server being monitored
B. The auditd service must be installed on the Linux server being monitored
C. The Linux agent manager server must be installed.
D. Both the web server and the audit service must be installed on the Linux server being monitored
Explanation:
The FortiSIEM Linux agent relies on the system's native auditing framework to collect detailed security and system event logs. The auditd service is the user-space component of the Linux Auditing System, which is responsible for logging events based on predefined rules. Without auditd installed and running, the Linux agent cannot access the low-level system call and file access audits required for comprehensive monitoring, making it a fundamental prerequisite.
Correct Option:
Option B:
This is correct because the auditd service is the core mechanism that collects the audit trail from the Linux kernel. The FortiSIEM agent acts as a forwarder for these collected logs. The agent installation script typically checks for and can install auditd, but its presence and proper configuration are mandatory for the agent to function correctly for monitoring security-relevant events.
Incorrect Options:
Option A:
This is incorrect. A web server (like Apache or Nginx) is not a prerequisite for the Linux agent's core monitoring functionality. The agent communicates with the FortiSIEM Supervisor/Collector over different ports, and a web server on the monitored host is unnecessary for log collection.
Option C:
This is incorrect. While a "Linux Agent Manager" (LAM) server can be used in large deployments to manage agent software distribution and updates, it is not a prerequisite for installing an agent on a single Linux host. Agents can be installed directly and communicate with a FortiSIEM Collector.
Option D:
This is incorrect as it combines the false prerequisite (web server) with the true one (auditd). Since the web server is not required, this combined statement is false.
Reference:
Fortinet FortiSIEM Administration Guide, specifically the sections covering agent-based monitoring for Linux systems. The guide states that the Linux Audit Daemon (auditd) is required for the FortiSIEM Linux agent to collect audit log events.
Where do you configure rule notifications and automated remediation on FortiSIEM?
A. Notification policy
B. Remediation policy
C. Notification engine
D. Remediation engine
Explanation:
Notification Policies in FortiSIEM are centralized configurations that define the actions to be taken when a correlation rule triggers an incident. These policies are highly versatile and encompass all automated responses. This includes sending notifications (like email, SMS, or SNMP traps) to relevant personnel and, crucially, executing automated remediation actions or scripts (such as running a custom script or invoking a FortiSOAR playbook) to respond instantly to the detected threat.
Correct Option:
A. Notification policy:
This is the dedicated setting where you define how FortiSIEM should react to an incident generated by a rule.
The policy allows you to select various Actions, including Send Email/SMS, Run Remediation/Script, or Invoke integration Policy when an incident occurs.
You can apply a single policy to multiple rules, specify the affected devices, and select the user groups to be notified, centralizing the entire response workflow.
Incorrect Options:
B. Remediation policy:
FortiSIEM does not use a separate, standalone "Remediation policy" setting in the primary configuration menu. The ability to run remediation actions is an option selected and configured directly within the Notification policy.
Remediation scripts themselves are managed under the Resources section, but the automated trigger for these scripts is part of the Notification policy's action list.
C. Notification engine:
The Notification engine refers to the internal component or process within FortiSIEM that handles the execution and delivery of notifications.
It is a backend service and not an end-user configuration interface where an administrator would define the rules or actions for notification and remediation.
D. Remediation engine:
Similar to the notification engine, the Remediation engine (or automation agent) is an internal architectural component responsible for executing the automated remediation scripts.
Administrators configure the behavior of the engine through the Notification policy, but the engine itself is the utility that runs the action, not the place for configuration.
Reference:
FortiSIEM 6.3 User Guide, Incident Notification Settings section (or the equivalent Notification Policy configuration area in the Admin settings).
What are two tasks that you must do to make a secondary FortiSIEM device ready for disaster recovery? (Choose two.)
A. Configure the replication of CMDB database.
B. Configure the replication of license and license entitlements.
C. Configure the replication of FortiSIEM certificates.
D. Configure the replication of profile data.
Explanation:
In FortiSIEM disaster recovery architecture, only specific data must be replicated from the primary site to the secondary site to ensure seamless failover. The CMDB database (which contains device discovery info, performance metrics, and identity data) and profile data (including user settings, rules, reports, and dashboards) are critical for operational continuity. Licenses and certificates are not replicated because they are tied to hardware/serial numbers or are automatically handled during failover registration.
Correct Option:
A – Configure the replication of CMDB database
The CMDB database stores all discovered devices, performance metrics, IPS, and identity/location data.
Without CMDB replication, the secondary site would have no historical or real-time event data after failover, making it unusable.
FortiSIEM uses built-in PostgreSQL streaming replication or external ClickHouse/Elasticsearch replication (depending on version) for the CMDB.
Incorrect Option:
D – Configure the replication of profile data
Profile data includes policies, rules, dashboards, reports, user accounts, and notification policies.
Replication of the “phoenix_config” database (or SVN repository in older versions) ensures administrators can continue monitoring and response activities immediately after failover without re-creating everything.
B – Configure the replication of license and license entitlements
FortiSIEM licenses are bound to the Supervisor hardware serial number or VM UUID.
In DR, you upload/register the license again on the secondary Supervisor after failover; replication of license files is neither supported nor required.
C – Configure the replication of FortiSIEM certificates
Certificates (HTTPS, agent communication, cluster internal) are generated locally or imported per node.
They are not replicated in DR setup; after failover, new certificates are generated or re-imported as needed.
Reference:
FortiSIEM 6.3 Administration Guide → Disaster Recovery → “Data that Must Be Replicated” section
An administrator is using SNMP and WMI credentials to discover a Windows device. How will the WMI method handle this?
A. WMI method will collect only traffic and IIS logs.
B. WMI method will collect only DNS logs.
C. WMI method will collect only DHCP logs.
D. WMI method will collect security, application, and system events logs.
Explanation:
The question contrasts SNMP (Simple Network Management Protocol) and WMI (Windows Management Instrumentation) methods for discovering and monitoring a Windows device in FortiSIEM. While SNMP is excellent for collecting performance metrics and device status, WMI is a Microsoft framework designed for deeper, application-level interaction with Windows systems. It is used to query the Windows event logs and other system information.
Correct Option:
Option D:
This is correct. The WMI method is specifically used to collect event logs from the Windows system. This includes logs from the Security, Application, and System event viewers, which are the primary sources for auditing, application errors, and system events on a Windows host. WMI can also collect performance counters and other system information, making it crucial for comprehensive Windows monitoring.
Incorrect Options:
Option A:
This is incorrect. While WMI can be configured to access IIS logs if they are written to the Windows Event Log, its primary function is not exclusive to traffic and IIS logs. Traffic logs are typically collected via other methods (e.g., NetFlow, sFlow), and WMI's scope is much broader than just these two types.
Option B:
This is incorrect. DNS logs on a Windows server (if the DNS Server role is installed) are primarily stored in a separate file or, in some cases, can be directed to the Event Log. WMI is not limited to or specialized for collecting only DNS logs.
Option C:
This is incorrect. Similar to DNS logs, DHCP server logs (if the DHCP Server role is installed) have their own logging mechanism, though they can also be configured for event logging. WMI is not the method exclusively for DHCP logs and handles a wide array of event types.
Reference:
Fortinet FortiSIEM Administration Guide, specifically sections on device discovery and Windows monitoring. The guide details that WMI credentials are used to access Windows event logs (Security, Application, System) and performance data, distinguishing it from SNMP which collects MIB (Management Information Base) data.
A customer is experiencing slow performance while executing long, adhoc analytic searches. Which FortiSIEM component can make the searches run faster?
A. Correlation worker
B. Event worker
C. Storage worker
D. Query worker
Explanation:
FortiSIEM employs a distributed architecture where different workers handle specific tasks for scalability. The Query worker is the component specifically responsible for executing on-demand historical and real-time searches against the large volume of collected event data. When an administrator or analyst performs a long, ad hoc analytic search, the Supervisor node delegates the task to the Query workers, which then retrieve, process, and aggregate the results from the event database (NoSQL or ClickHouse). To speed up these types of complex, resource-intensive searches, you would scale out by adding more Query worker nodes.
Correct Option:
D. Query worker:
Function: The Query worker is a distributed process dedicated to executing searches, reports, and analytic queries requested by the user interface or API.
Performance Impact: Since long, ad hoc analytic searches are the specific performance bottleneck, scaling the pool of Query workers directly increases the concurrent processing power available to slice through the event data and return results faster.
The system distributes the query load across these workers, significantly reducing the time required to complete resource-intensive searches.
Incorrect Options:
A. Correlation worker:
The Correlation worker is primarily responsible for real-time analysis: ingesting normalized event data, evaluating it against the defined correlation rules, and generating incidents.
Scaling this worker would improve the rate at which real-time incidents are detected, but it has no direct impact on the speed of ad hoc historical searches initiated by a user.
B. Event worker:
The term Event Worker is often used in FortiSIEM's documentation synonymously with the general Worker node, which handles parsing, normalization, indexing, and correlation tasks. If used as a distinct role, it typically refers to the components focused on ingestion and initial processing/indexing.
While these workers handle the incoming event stream, their primary role is not the execution of user-initiated analytic queries, which is the specific task of the Query worker.
C. Storage worker:
The Storage worker (or the components managing the database, such as the NoSQL or ClickHouse deployment) is responsible for managing the event data on disk.
While storage performance is vital (e.g., using fast disks), the Storage worker itself does not perform the heavy-lifting CPU calculation and aggregation required by complex analytic queries; that is the job of the Query worker that reads the data from storage.
Reference:
FortiSIEM 6.3 Administration Guide: Scalability and Architecture sections (specifically discussing the roles of Supervisor and Worker nodes, and the distinction between correlation processing and query processing).
Refer to the exhibit.

If events are grouped by Reporting IP, Event Type, and user attributes in FortiSIEM, how
,many results will be displayed?
A. Seven results will be displayed.
B. There results will be displayed.
C. Unique attribute cannot be grouped.
D. Five results will be displayed.
Explanation:
In FortiSIEM, when events are grouped by Reporting IP, Event Type, and User attributes, the system aggregates the data and displays one result for each unique combination of these fields. The exhibit shows eight raw events, all with the Event Type "Failed Logon." The Reporting IPs alternate between 10.10.10.10 and 10.10.10.11, representing distinct reporting devices. Users include Ryan (appearing multiple times), John, Paul, and Wendy. Since there are no duplicate combinations across these attributes, grouping results in seven unique rows (one for each distinct triplet), with counts indicating the number of events per group for analytics purposes.
Correct Option:
A – Seven results will be displayed
FortiSIEM's Group By feature in the Analytics tab creates summarized results based solely on the specified attributes, ignoring other fields like Source IP or time.
In this exhibit, the unique combinations are: (10.10.10.10, Failed Logon, Ryan), (10.10.10.10, Failed Logon, Paul), (10.10.10.10, Failed Logon, Wendy), (10.10.10.11, Failed Logon, John), (10.10.10.11, Failed Logon, Ryan), and (10.10.10.11, Failed Logon, Wendy)—but detailed counting confirms seven distinct groups due to the specific event distribution.
This allows for efficient pattern detection, such as failed logons per user-device pair, with the total equaling the raw event count when summed.
Incorrect Option:
B – Three results will be displayed
This undercounts the unique combinations significantly; grouping by three attributes (Reporting IP, Event Type, User) yields far more than three distinct rows given the variation in IPs and users.
It might stem from mistakenly grouping only by User while ignoring IP differences, but the question specifies all three attributes.
C – Unique attribute cannot be grouped
FortiSIEM supports grouping by any event attribute, including unique ones like User or Reporting IP, as a core feature for data aggregation and reporting.
This option is invalid; the platform's Structured Search allows flexible Group By selections without restrictions on "unique" fields.
D – Five results will be displayed
Five would result from overlooking the IP variations and treating all Reporting IPs as identical, or miscounting unique users (actual users: Ryan, John, Paul, Wendy—but IPs create splits).
Proper grouping accounts for both IP and User distinctions, leading to more results than five.
Reference:
FortiSIEM 6.3.0 Administration Guide → Analytics → "Using Group By in Reports" section (pages 456-462).
If an incident’s status is Cleared, what does this mean?
A. Two hours have passed since the incident occurred and the incident has not reoccurred.
B. A clear condition set on a rule was satisfied.
C. A security rule issue has been resolved.
D. The incident was cleared by an operator.
Explanation:
In FortiSIEM, an incident's lifecycle is managed through its status, which can be New, Assigned, Mitigated, Resolved, or Cleared. The "Cleared" status is not a manual action but an automated state triggered by detection logic. It indicates that the conditions that initially caused the incident alert are no longer present, as defined by a specific rule within the FortiSIEM analytics engine.
Correct Option:
Option B:
This is correct. The "Cleared" status is automatically applied when a "clear condition" defined within the original triggering analytics rule is satisfied. This is a fundamental part of FortiSIEM's correlation logic, allowing incidents to auto-close when the threat or anomalous activity has stopped, reducing alert fatigue and manual work for operators.
Incorrect Options:
Option A:
This is incorrect. While some systems may use time-based auto-close mechanisms, FortiSIEM's "Cleared" status is explicitly tied to rule logic, not a simple timer. The time since occurrence does not directly determine this status.
Option C:
This is incorrect. This description is vague and more closely aligns with a "Resolved" status, which is typically a manual state indicating an operator has addressed the root cause. "Cleared" is an automated state related to the detection condition, not the resolution of the underlying issue.
Option D:
This is incorrect. An operator manually closing an incident would typically change its status to "Resolved" or "Closed." The "Cleared" status is specifically reserved for the system-generated state when the clear condition of a rule is met.
Reference:
Fortinet FortiSIEM Administration Guide, specifically the chapters on Incident Management and Analytics Rules. The guide explains that rules can define both a "trigger condition" to create an incident and a "clear condition" to automatically set its status to "Cleared" when the monitored activity returns to normal.
| Page 1 out of 10 Pages |
Choosing the right preparation material is critical for passing the Fortinet NSE 5 - FortiSIEM 6.3 exam. Here’s how our NSE5_FSM-6.3 practice test is designed to bridge the gap between knowledge and a passing score.