Last Updated On : 13-Jan-2026


Fortinet Fortinet NSE 6 - FortiSOAR 7.3 Administrator - NSE6_FSR-7.3 Practice Questions

Total 43 Questions



The smartest way to prepare for your Fortinet NSE6_FSR-7.3 exam isn't just reading—it's practicing. Our Fortinet Fortinet NSE 6 - FortiSOAR 7.3 Administrator practice test bridge gap, transforming your knowledge into a passing score. Familiarize yourself with the exact style and difficulty of the real Fortinet NSE6_FSR-7.3 practice questions, so there are no surprises. Get detailed feedback to identify your strengths and target your weaknesses, making your study time more efficient.

Which two ports must be open between FortiSOAR HA nodes'* (Choose two.)



A. Port 5432


B. Port 25


C. Port 6380


D. Port 9200





A.
  Port 5432

D.
  Port 9200

Explanation

FortiSOAR High Availability relies on constant communication between cluster nodes for database replication and search functionality. Only specific ports carry the critical traffic required for synchronization, heartbeat, and failover operations. Opening the correct ports ensures the cluster forms properly and remains stable even during node failures.

✅ Correct Option: A. Port 5432
This is the default PostgreSQL port. In an HA cluster, the primary node continuously replicates its database to the secondary node through port 5432. Without bidirectional access, replication stops, preventing the secondary from staying in sync and making failover impossible.

✅ Correct Option: D. Port 9200
Port 9200 is used by Elasticsearch (or OpenSearch in newer versions) for HTTP communication. All FortiSOAR nodes need to reach the search cluster on this port to index and query data. In HA deployments, blocking 9200 causes search failures and indicator enrichment issues after failover.

❌ Incorrect Option: B. Port 25
Port 25 is for SMTP/email relay. While FortiSOAR can send alerts via email, this traffic is unrelated to HA node-to-node communication. It can remain closed between cluster nodes without affecting availability or synchronization.

❌ Incorrect Option: C. Port 6380
Port 6380 is typically associated with Redis Sentinel or cluster bus in some environments, but FortiSOAR does not use it for HA communication. Opening it has no impact on cluster health or replication.

Summary
For FortiSOAR HA to function correctly, ports 5432 (PostgreSQL replication) and 9200 (Elasticsearch/OpenSearch) must be open bidirectionally between all nodes.Ports 25 and 6380 are not required for clustering and can remain blocked in the internal firewall rules.

Reference
Fortinet Docs – High Availability support in FortiSOAR

Which three actions can be performed from within the war room? (Choose three)



A. View graphical representation of all records linked to an incident in the Artifacts lab


B. Change the room's status to Escalated to enforce hourly updates.


C. Investigate issues by tagging results as evidence.


D. Use the Task Manager tab to create, manage, assign, and track tasks.


E. Integrate a third-party instant messenger directly into the collaboration workspace.





A.
  View graphical representation of all records linked to an incident in the Artifacts lab

C.
  Investigate issues by tagging results as evidence.

D.
  Use the Task Manager tab to create, manage, assign, and track tasks.

Explanation:

The FortiSOAR War Room is a central workspace designed for real-time, collaborative incident investigation and response. It provides specific tools for visualizing relationships, documenting findings, and coordinating team actions, all within the context of a single security incident. The available actions focus on investigation and response management rather than system-wide configuration or external software integration. Understanding the scope of the War Room is key to effective incident handling.

✅ Correct Options:

A. View graphical representation of all records linked to an incident in the Artifacts lab:
The Artifacts lab within the War Room provides a visual investigation map. It automatically generates a graphical layout showing the connections between the incident and related records like alerts, assets, and indicators, helping analysts quickly understand relationships and scope.

C. Investigate issues by tagging results as evidence:
Tagging is a critical forensic and organizational function. Analysts can tag any action's output (like query results or enriched data) as "Evidence." These tagged items are centrally collected in the War Room's Evidences tab for reporting and case building.

D. Use the Task Manager tab to create, manage, assign, and track tasks:
The Task Manager is essential for response coordination. It allows the team to break down the investigation into actionable tasks, assign them to members, set statuses (To Do, In Progress, Done), and track completion to ensure nothing is missed.

❌ Incorrect Options:

B. Change the room's status to Escalated to enforce hourly updates:
This describes a non-existent War Room feature. War Rooms have statuses like "Draft" and "Active." There is no "Escalated" status, and while update communications can be sent, there is no system to "enforce" them hourly based on status.

E. Integrate a third-party instant messenger directly into the collaboration workspace:
Collaboration in the War Room happens through native tools only. The Workspace panel allows comments and user tagging, and the Communication tab sends email updates. Direct integration of external IM clients like Slack or Teams is not supported within the interface.

Summary:
The War Room is designed for hands-on incident work. Valid actions include visual analysis in the Artifacts lab, tagging evidence, and managing tasks. Setting an "Escalated" status or integrating third-party chat are not functions of this module.

Reference:
Fortinet Documentation - FortiSOAR 7.6 User Guide, "Chapter 7: Managing Incidents and War Rooms."

Which two relationship types are configurable on FortiSOAR? (Choose two.)



A. Siblings


B. Grandparents


C. Parents


D. Relatives





A.
  Siblings

C.
  Parents

Explanation

FortiSOAR provides configurable relationship types that help analysts understand how records connect during investigations. These relationships create structured links between incidents, indicators, alerts, and artifacts, enabling better case correlation. Only specific, logically defined types—such as parent-child or sibling—are supported. Broader or multi-layered familial terms are not part of the platform’s relationship model.

🟩 Correct Option: A. Siblings
🟢 Sibling relationships are configurable in FortiSOAR and represent records that share a common relationship without depending on one another. This linkage is especially useful for grouping similar alerts, correlating related artifacts, or reviewing parallel findings in an investigation. It helps analysts view lateral connections and improves data clarity.

🟩 Correct Option: C. Parents
🟢 Parent relationships are supported and commonly used to show hierarchical structure. They allow an incident to act as the parent record for multiple alerts, artifacts, or indicators. This makes investigations more organized and helps teams understand how supporting data contributes to the main incident being handled.

🟥 Incorrect Option: B. Grandparents
🔴 FortiSOAR does not offer “grandparent” relationships. The system avoids multi-tiered generational structures to keep investigations simple and navigable. Its design relies on parent-child and sibling models, which provide clarity without unnecessary complexity.

🟥 Incorrect Option: D. Relatives
🔴 “Relatives” is not a configurable relationship category. FortiSOAR keeps relationship types precise and functional. Broad family-style terminology does not fit into the structured relationship taxonomy required for SOC workflows, so it is not included.

Summary
FortiSOAR supports structured relationships such as parents and siblings to help analysts categorize and correlate records. Broader or generational types like grandparents or relatives are not supported. The correct answers reflect FortiSOAR’s practical and investigative-focused design.

📚 Reference
Fortinet Official Documentation – FortiSOAR Admin & User Guide: Record Relationship Types & Configuration

What are two system-level logs that can be purged using application configuration? (Choose two.)



A. Connector logs


B. Reporting logs


C. Audit togs


D. Executed Playbook logs





C.
  Audit togs

D.
  Executed Playbook logs

Explanation

FortiSOAR's Application Configuration provides system-level settings specifically designed to manage high-volume data retention. To prevent database bloating and performance degradation, administrators must configure automatic purging schedules. The two log categories that accumulate the fastest and are explicitly managed through these purge settings are records related to compliance/user history and the extensive tracking data from all automated workflow executions.

Correct Options: C and D

✅ Audit logs (C)
Audit logs document all critical user activities and configuration changes, vital for security, troubleshooting, and regulatory compliance. Since these logs constantly grow, the Application Configuration allows defining a strict retention period. Purging older Audit logs according to this policy ensures compliance data is retained while keeping the database size manageable and optimized for performance.

✅Executed Playbook logs (D)
These logs, also known as the Playbook Execution History, record every detail of every automated workflow run. They are the primary source of database growth in an active SOAR environment. The dedicated purging setting for Executed Playbook logs allows administrators to automatically delete execution records older than a set limit, which is crucial for maintaining high system responsiveness and efficient database indexing.

Incorrect Options: A and B

Connector logs (A)
Connector logs track the low-level API communication with external products and are used primarily for real-time debugging. They are usually managed locally by the operating system's log rotation utilities (like logrotate). Therefore, they are not typically managed or purged through the centralized, database-focused retention settings found in the FortiSOAR's Application Configuration UI.

Reporting logs (B)
The term "Reporting logs" doesn't correspond to a dedicated, purgable log category in the Application Configuration settings like Audit or Execution History. Reporting data is generally derived from core database tables. If historical reporting data needs cleanup, it is usually addressed through FortiSOAR's broader Data Archival feature, not the focused administrative controls for log purging.

Reference 🔗
Fortinet Documentation: FortiSOAR Administration Guide (See sections on Application Configuration and data retention)

Which product is essential to level 3 of the SOC automation model?



A. FortiAnalyzer


B. FortiAuthenticator


C. FortiManager


D. FortiSOAR





D.
  FortiSOAR

Explanation

The SOC automation maturity model defines five levels of increasing automation. Level 3 ("Orchestration and Automation") requires a dedicated Security Orchestration, Automation, and Response (SOAR) platform that can execute multi-step playbooks across multiple security tools, automate repetitive analyst tasks, and orchestrate incident response workflows. Only a true SOAR solution meets these requirements.

✅ Correct Option: D. FortiSOAR
FortiSOAR is Fortinet’s SOAR platform specifically designed for level 3 and above. It provides playbook automation, case management, bi-directional integration with hundreds of security products, and response orchestration—exactly what distinguishes level 3 from lower levels that rely only on alerting or basic ticketing.

❌ Incorrect Option: A. FortiAnalyzer
FortiAnalyzer is a powerful SIEM and log management platform that provides advanced analytics, incident detection, long-term storage, and customizable reports. While it forms a critical data foundation for any SOC (especially Levels 1–2), it lacks native orchestration engines, automated playbook execution, cross-tool response actions, and case management workflows, so it cannot elevate an organization to Level 3 on its own.

❌ Incorrect Option: B. FortiAuthenticator
FortiAuthenticator focuses exclusively on identity and access management—handling strong authentication, single sign-on, certificate management, and guest portals. It has no capabilities for incident orchestration, playbook automation, or security tool integration outside of authentication contexts, making it completely unrelated to SOC automation maturity progression.

❌ Incorrect Option: C. FortiManager
FortiManager centrally manages FortiGate and other Fortinet device policies. While useful for configuration consistency, it does not automate incident response workflows or orchestrate actions across disparate security tools.

Summary
Level 3 of the SOC automation model is achieved only when a true SOAR platform is implemented. FortiSOAR is the Fortinet product that delivers the required orchestration, automation, and case management capabilities. The other products support security operations but do not provide SOAR functionality.

Reference
Fortinet Docs – Security Orchestration, Automation and Response (SOAR)

A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)



A. Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.


B. View the user's effective role permissions, and then investigate which role is providing that access.


C. Remove all record ownership that is assigned to the user.


D. Review the user's learn hierarchy to ensure that the appropriate relationships are configured.





A.
  Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.

B.
  View the user's effective role permissions, and then investigate which role is providing that access.

Explanation:

This scenario tests your understanding of the FortiSOAR access control model and the steps to audit and remediate unauthorized permissions. Unauthorized access typically stems from explicit permissions assigned to a user, not from data ownership. The correct procedure involves first investigating the source of the access and then explicitly removing the unnecessary permissions.

✅ Correct Options:

A. Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.
This is the definitive remediation action. Once you identify which specific permissions are excessive, you must edit the user's assigned roles or the role's permission definitions to revoke the unnecessary CRUD access to the System Configuration module or other areas.

B. View the user's effective role permissions, and then investigate which role is providing that access.
This is the critical first step in the auditing process. A user's "Effective Permissions" view aggregates all permissions granted by their assigned roles. Reviewing this will show exactly what access the user has and, more importantly, trace that access back to the specific role that grants it.

❌ Incorrect Options:

C. Remove all record ownership that is assigned to the user.
Record ownership relates to data-level control over specific incidents, alerts, or assets, not system-level configuration access. Removing ownership would affect their ability to manage certain records but would not directly revoke their permissions to access the System Configuration menu or its functions.

D. Review the user's learn hierarchy to ensure that the appropriate relationships are configured.
This is a distractor. "Learn hierarchy" is not a standard FortiSOAR term. The relevant concept is the team hierarchy, which can affect data visibility through record sharing rules. However, access to the System Configuration module is governed strictly by global role-based permissions, not by team relationships.

Summary:
To audit and fix unauthorized system access, first use the Effective Permissions view to identify the source role (B), then edit that role or the user's assignments to remove the excessive permissions (A). Data ownership and team structures do not control access to system administration areas.

Reference:
Fortinet Documentation - FortiSOAR Administration Guide, "Managing Users and Role-Based Access Control (RBAC)."

What are two use cases for configuring a FortiSOAR HA cluster? (Choose two.)



A. Disaster recovery


B. Multi-tenancy


C. Data externalization


D. Scaling





A.
  Disaster recovery

D.
  Scaling

Explanation

Configuring a FortiSOAR High Availability (HA) cluster ensures continuous operation and improved system performance. HA clusters protect against system failures and help handle increased workloads by distributing tasks across nodes. Use cases typically focus on disaster recovery and scaling operations, providing reliability and capacity for SOC activities. Features like multi-tenancy or data externalization are managed differently and are not primary HA use cases.

🟩 Correct Option: A. Disaster recovery
🟢 HA clusters provide failover capabilities, ensuring that if one node fails, another can take over without disrupting SOC operations. This supports disaster recovery by maintaining uptime and protecting critical incident response processes from hardware or software failures, minimizing operational risk.

🟩 Correct Option: D. Scaling
🟢 FortiSOAR HA clusters allow scaling of resources to handle higher workloads. Adding nodes distributes processing tasks, improves system responsiveness, and ensures that incident handling, automation, and analytics can continue smoothly as demand increases, maintaining SOC efficiency.

🟥 Incorrect Option: B. Multi-tenancy
🔴 Multi-tenancy is about supporting multiple isolated users or organizations within a single platform. HA clustering does not provide multi-tenancy features; it focuses solely on redundancy and performance, not separation of tenant environments.

🟥 Incorrect Option: C. Data externalization
🔴 Data externalization refers to moving or storing data outside the primary system. HA clustering does not handle external data storage; its purpose is redundancy and scaling within the platform, not exporting or externalizing data.

Summary
FortiSOAR HA clusters are designed to ensure high availability through disaster recovery and scaling capabilities. They do not address multi-tenancy or data externalization, which are managed by separate system features.

📚 Reference
Fortinet Official Documentation – FortiSOAR Admin & User Guide: High Availability Configuration

Page 1 out of 7 Pages

Why Prepare with PrepForti NSE6_FSR-7.3 Practice Test?

Choosing the right preparation material is critical for passing the Fortinet Fortinet NSE 6 - FortiSOAR 7.3 Administrator exam. Here’s how our NSE6_FSR-7.3 practice test is designed to bridge the gap between knowledge and a passing score.

Experience the Real Exam Format:


Familiarize yourself with the exact style, difficulty, and question types you will encounter on the official Fortinet exam. Our Fortinet NSE 6 - FortiSOAR 7.3 AdministratorNSE6_FSR-7.3 test questions, like the samples on this page, cover specific technical scenarios and MCQs to ensure there are no surprises on test day.

Turn Knowledge into Application:


The smartest way to prepare isn't just reading - it's practicing. Our Fortinet NSE 6 - FortiSOAR 7.3 Administrator practice test questions transforms your theoretical understanding into practical problem-solving skills, exactly what is required to pass.

Learn with Detailed Explanations:


All NSE6_FSR-7.3 exam questions comes with a comprehensive summary and a breakdown of why the correct option is right and the others are wrong. This detailed feedback helps you identify your strengths and target your weaknesses, making your Fortinet NSE 6 - FortiSOAR 7.3 Administrator study time far more efficient.



Experience the Real Exam Now!

Pocket Guide: Conquer the Fortinet NSE6_FSR-7.3 NSE 6 FortiSOAR 7.3 Administrator Exam


Feeling prepared is the key to exam success. This quick-reference guide distills the essential information you need to confidently approach the FortiSOAR 7.3 Administrator exam.

Exam Info at a Glance

Exam Code: NSE6_FSR-7.3
Number of Questions: 30
Duration: 60 minutes
Passing Score: A minimum score of 70% is required to achieve certification.

Key Exam Topics to Master

Your study focus should be on the practical administration of FortiSOAR. The exam will test your ability to:

1. Deploy and Configure: Understand installation methods, initial setup, and system configuration.
2. Manage Playbooks: Demonstrate proficiency in creating, editing, troubleshooting, and executing playbooks to automate security workflows.
3. Handle Connectors: Know how to install, configure, and use connectors to integrate with other security products and data sources.
4. Administer the System: Manage users, roles, teams, and overall system settings to ensure smooth operation.
5. Optimize and Maintain: Perform essential maintenance tasks and apply optimizations for peak performance.

Your Strategy for Success


While official Fortinet documentation is crucial, there is no substitute for hands-on practice. Understanding the theory is one thing; applying it under exam conditions is another. To bridge this gap, we highly recommend our NSE6_FSR-7.3 practice exam. Taking our simulated Fortinet NSE 6 FortiSOAR 7.3 Administrator practice test is the best way to turn your knowledge into a passing score.

Fortinet Fortinet NSE 6 - FortiSOAR 7.3 Administrator Practice Exam Questions