Last Updated On : 13-Jan-2026


Fortinet NSE 7 - Security Operations 7.6 Architect - NSE7_SOC_AR-7.6 Practice Questions

Total 57 Questions


Integration and Fabric Connectors

Refer to the Exhibit: An analyst wants to create an incident and generate a report whenever FortiAnalyzer generates a malicious attachment event based on FortiSandbox analysis. The endpoint hosts are protected by FortiClient EMS integrated with FortiSandbox. All devices are logging to FortiAnalyzer.
Which connector must the analyst use in this playbook?



A. FortiSandbox connector


B. FortiClient EMS connector


C. FortiMail connector


D. Local connector





A.
  FortiSandbox connector

Explanation:

The scenario here revolves around automating incident creation and reporting in FortiSOAR (or similar playbook tools) triggered by FortiAnalyzer-detected malicious attachments from FortiSandbox scans with EMS-protected endpoints logging centrally to FAZ. It's about picking the right connector to kick off the playbook response when that specific event hits.

✅ Correct Answer: A. FortiSandbox connector
This is the ideal choice because the malicious attachment event originates directly from FortiSandbox analysis, which FortiAnalyzer surfaces as a triggerable event (often via integration hooks). The FortiSandbox connector lets the playbook listen for those sandbox verdicts—like malware detections in attachments—then create the incident and spawn the report. Even though FAZ is the aggregator and EMS is in the mix for endpoints, the connector targets the source of the analysis for precise event handling, ensuring the playbook fires reliably on sandbox results. ​

❌ Incorrect Answers:

B. FortiClient EMS connector
Handy for endpoint actions like quarantines, but it won't catch FortiAnalyzer's sandbox-based events. EMS focuses on client telemetry (e.g., endpoint detections), not FAZ-generated alerts from sandbox scans a frequent mix-up since EMS integrates with sandbox, but the trigger here is FAZ-relayed.

C. FortiMail connector
This one's for mail server events like spam/phishing, not general sandbox attachment analysis across endpoints. No direct tie to FAZ or EMS in this setup, so it misses the mark entirely.

D. Local connector
Too generic—it's for internal SOAR actions or system events, not polling external FortiSandbox verdicts via FAZ. Using it would require custom polling, which complicates things unnecessarily when a dedicated connector exists.

📚 Reference
Fortinet Documentation: https://docs.fortinet.com

Refer to the exhibits.



You have a playbook that, depending on whether an analyst deems the alert to be a true positive, could reference a child playbook. You need to pass variables from the parent playbook to the child playbook.
Place the steps needed to accomplish this in the correct order.








Explanation:

In FortiAnalyzer (and its underlying FortiSOAR engine for playbooks), you often build modular automation: a parent playbook handles the main logic (like checking if an alert is real), then calls a child playbook for specific tasks (here, disabling a user account in Active Directory if approved). To make the child useful, the parent needs to send data over—like the username or account details. This is done with input parameters. You define them first in the child (so it knows what to expect), use them in the child's actions, and then map actual values from the parent when you call it via the "Reference a Playbook" step. The exhibits show exactly this setup: parent has approval branching, then references the child to do the disable.

Correct order of steps

The steps go in this sequence:

Create a parameter in the child playbook.
This is step 1. You start here because the child has to be ready to receive data. In the child's playbook (under its Start/Referenced trigger), go to Tools > Parameters (or the parameters section) and add an input parameter (e.g., something like "samAccountName" or "userDN"). Without this, there's nothing for the parent to send to. This is the foundation—child declares what it needs.

Apply the parameter to the Disable User Account connector action.
This is step 3 in the list (but logically step 2 after defining it). In the child playbook, edit the "Disable User Account" task (Active Directory connector). In the field where it needs the account to disable (like User DN or SamAccountName), use a Jinja expression to pull from the parameter, e.g., {{vars.input.params.userDN}} or similar. This makes the action actually use whatever data comes from the parent.

Map data to the parameter in the Reference a playbook step in the parent playbook.
This is step 2 in the list (but completes the flow). Back in the parent, in the "Reference a Playbook" task that calls the child, you'll see fields for the parameters you defined in the child. Map values from the parent's context—like pulling the account name from the alert/record using dynamic variables (e.g., {{record.samAccountName}} or from earlier steps like the search). This is how the data actually crosses over.

The other options don't fit:
Creating a parameter in the parent isn't required for passing to child (parents pass data out, but don't need new params just for this). Creating a manual trigger and assigning a user to a new variable is unrelated—manual triggers are for on-demand playbooks, not passing data to referenced/child ones.

Why this order makes sense?
Think of it like handing off a package: first the receiver (child) tells you their address (create parameter), then labels the box inside their house with that address (apply to action), then you write the address on the package and ship it (map in reference step). Reverse any of that and it fails.

Reference
Fortinet Documentation: https://docs.fortinet.com/product/fortianalyzer/7.6

Refer to the exhibits. You configured a spearphishing event handler and the associated rule. However. FortiAnalyzer did not generate an event.
When you check the FortiAnalyzer log viewer, you confirm that FortiSandbox forwarded the appropriate logs, as shown in the raw log exhibit.
What configuration must you change on FortiAnalyzer in order for FortiAnalyzer to generate an event?



A. In the Log Type field, change the selection to AntiVirus Log(malware).


B. Configure a FortiSandbox data selector and add it tothe event handler.


C. In the Log Filter by Text field, type the value: .5 ub t ype ma Iwa re..


D. Change trigger condition by selecting. Within a group, the log field Malware Kame (mname> has 2 or more unique values.





B.
  Configure a FortiSandbox data selector and add it tothe event handler.

Explanation:

🔍 Concept summary
This question tests how FortiAnalyzer event handlers actually match logs. Even when logs are present in the log viewer, FortiAnalyzer will not generate an event unless the event handler is explicitly linked to the correct log source. Seeing logs is not enough. The event handler must be told which device and log type to evaluate.
The core issue here is missing log selection, not filtering logic or trigger conditions.

✅ Correct answer: B. Configure a FortiSandbox data selector and add it to the event handler.
FortiSandbox logs are not evaluated by default unless you explicitly include them using a data selector.
In this case:

  • FortiSandbox is forwarding logs correctly.
  • The logs are visible in the FortiAnalyzer log viewer.
  • But the event handler does not reference FortiSandbox as a log source.
Without a FortiSandbox data selector, the event handler never evaluates those logs, so no event is generated. Once you add the FortiSandbox selector to the handler, FortiAnalyzer knows to inspect those logs and the event triggers correctly.
This is a classic FortiAnalyzer pitfall: logs exist, but the handler is blind to them.

❌ Incorrect options

❌ A. In the Log Type field, change the selection to AntiVirus Log (malware).
FortiSandbox logs are not AntiVirus logs. They have their own log structure and device type.
Changing the log type to AntiVirus would cause FortiAnalyzer to look in the wrong place entirely. The logs would still be ignored because they are coming from FortiSandbox, not FortiGate AV inspection.

❌ C. In the Log Filter by Text field, type the value: subtype=malware.
This assumes the problem is text filtering, which it isn’t.
The logs are already confirmed to contain the correct malware information. The issue is that the event handler never evaluates FortiSandbox logs at all. Adding a text filter does nothing if the handler is not tied to the FortiSandbox data source.
This is a common misunderstanding: filters only work after the correct log source is selected.

❌ D. Change trigger condition by selecting: Within a group, the log field Malware Name (mname) has 2 or more unique values.
Trigger conditions define how an event fires, not whether logs are evaluated.
If FortiAnalyzer is not even looking at FortiSandbox logs, changing grouping or thresholds is irrelevant. This option treats the symptom instead of the root cause.

Reference
Fortinet Documentation: https://docs.fortinet.com

When does FortiAnalyzer generate an event?



A. When a log matches a filter in a data selector


B. When a log matches an action in a connector


C. When a log matches a rule in an event handler


D. When a log matches a task in a playbook





C.
  When a log matches a rule in an event handler

Explanation:

This question tests your understanding of the FortiAnalyzer event generation process. A key function of FortiAnalyzer is to analyze incoming logs and elevate them to noteworthy security Events when they meet specific, predefined conditions. This mechanism is the foundation of FortiAnalyzer's Security Operations Center (SOC) capabilities.
The correct answer focuses on the central, configurable component responsible for this detection logic.

✅ C. When a log matches a rule in an event handler.
This is the fundamental and correct mechanism for event generation in FortiAnalyzer. An Event Handler is a user-defined object that contains one or more detection rules. Its primary job is to continuously inspect incoming logs and generate an event whenever a log entry meets the criteria specified in its rules.

Here’s how it works:
✔️ Configuration: You create an event handler and define rules within it. These rules specify which log types to monitor (e.g., Traffic, IPS, Virus) and set the conditions for an event, such as matching specific source IPs, threat severity levels, or the number of occurrences within a timeframe.
✔️ Evaluation: As logs flow into FortiAnalyzer, the system runs them against all enabled event handlers.
✔️ Generation: A log that successfully matches all the conditions of a rule triggers that rule, causing FortiAnalyzer to generate a new Event. This event is then displayed in the Event Monitor and can optionally trigger notifications or automatically create an Incident.

❌ A. When a log matches a filter in a data selector.
This is a common point of confusion, but it's incorrect. A Data Selector is a tool used to scope and filter the logs that are fed into an event handler. Its purpose is administrative—to define which devices or subnetworks the event handler will process logs from. While it does contain filters, matching a data selector's filter alone does not generate an event. It simply determines whether a log is eligible to be evaluated by the event handler's rules in the first place.

❌ B. When a log matches an action in a connector.
This is incorrect and confuses different Fortinet product functions. Connectors (like Fabric Connectors) are typically used for outbound actions or integrations, such as sending an alert notification to another system (like FortiGate via Automation Stitch) after an event has already been generated. They are a response to an event, not the cause of it.

❌ D. When a log matches a task in a playbook.
This is also incorrect. Playbooks are associated with FortiSOAR (Security Orchestration, Automation, and Response), which is a separate product designed for post-event workflow automation. A playbook executes a series of tasks (like blocking an IP) in response to an incident that was created from a FortiAnalyzer event. The event generation happens in FortiAnalyzer first, before any playbook task is triggered.

Key Takeaway for Your Exam
Always remember this core sequence: Logs → Event Handler (with Rules) → Event → (Optional) Incident/Notification/Automation. The event handler and its rules are the essential, non-negotiable trigger for creating an event from a log in FortiAnalyzer.

Review the incident report: Packet captures show a host maintaining periodic TLS sessions that imitate normal HTTPS traffic but run on TCP 8443 to a single external host. An analyst flags the traffic as potential command-and-control. During the same period, the host issues frequent DNS queries with oversized TXT payloads to an attacker-controlled domain, transferring staged files.
Which two MITRE ATT&CK techniques best describe this activity? (Choose two answers)



A. Non-Standard Port


B. Exploitation of Remote Services


C. Exfiltration Over Alternative Protocol


D. Hide Artifacts





A.
  Non-Standard Port

C.
  Exfiltration Over Alternative Protocol

Explanation:

Summary
The activity described involves two distinct phases. First, the attacker is using an encrypted "tunnel" (TLS) on a port it doesn't belong to (TCP 8443) to talk to their home server; this is a trick to bypass simple firewalls that only check for standard traffic on standard ports. Second, they are moving stolen files out of the network by hiding pieces of data inside DNS TXT records. Since DNS is required for the internet to work, many organizations leave it relatively unmonitored, making it a perfect "alternative protocol" for stealing data without triggering high-traffic alerts.

The Correct Answers

✅ A. Non-Standard Port
The report mentions the host is running TLS sessions (normally TCP 443) over TCP 8443. In the MITRE ATT&CK framework, the technique Non-Standard Port (T1571) specifically refers to adversaries communicating using a protocol and port pairing that are typically not associated. Even though 8443 is often used for "alternative" HTTPS, it is officially considered a non-standard port for standard web traffic, and attackers use it to evade security filters that only inspect port 443.

✅ C. Exfiltration Over Alternative Protocol
The second part of the scenario describes transferring staged files using DNS queries with oversized TXT payloads. This is a textbook example of Exfiltration Over Alternative Protocol (T1048). Instead of using a dedicated file-transfer protocol like FTP or a web upload (HTTP/S), the attacker is abusing DNS—a protocol meant for address resolution—to "tunnel" the file data out of the network bit by bit.

Why the Other Options are Incorrect?

❌ B. Exploitation of Remote Services
This technique (T1210) refers to an attacker taking advantage of a programming error or "vulnerability" in a network service (like an unpatched VPN or web server) to gain access. In the scenario provided, the attacker already has a foothold and is communicating/exfiltrating data. There is no mention of a software vulnerability being exploited to gain entry.

❌ D. Hide Artifacts
This technique (T1564) involves an attacker trying to hide their presence on the host itself (e.g., hiding files in obscure directories, using hidden NTFS streams, or renaming malicious tools to look like system files). While the attacker is trying to hide their traffic (which is "Data Obfuscation" or "Protocol Impersonation"), "Hide Artifacts" specifically refers to the persistence and defense evasion steps taken on the local file system or operating system, not the network traffic patterns.

Official Reference:
https://docs.fortinet.com

Which two playbook triggers enable the use of trigger events in later tasks as trigger variables? (Choose two.)



A. EVENT


B. INCIDENT


C. ON SCHEDULE


D. ON DEMAND





A.
  EVENT

B.
  INCIDENT

Explanation:

FortiAnalyzer playbooks start with a trigger that decides when they run. Some triggers bring in real "event" or "incident" data from the system—like details from a newly created event (alert) or incident—and make that data available as variables (often called trigger variables, formatted like ${trigger.something}) for use in later playbook tasks. This lets you reference things like the source IP, user name, or event severity dynamically in actions such as searches, updates, or notifications. Not all triggers provide this incoming context: scheduled or manual ones usually don't carry the same live trigger payload.

Correct answers

✅ A. EVENT
This is correct. The EVENT_TRIGGER (or EVENT) starts the playbook when a matching event is created in FortiAnalyzer. The event details—like fields from the log or event record—are passed in and accessible as trigger variables throughout the playbook. You can pull things like ${trigger.epip} (endpoint IP), ${trigger.user}, or other event attributes directly into tasks. This is one of the main ways playbooks react to security detections automatically.

✅ B. INCIDENT
This is also correct. The INCIDENT_TRIGGER runs when a new incident matches your filters. Just like with events, the incident's data (fields, linked events, status, etc.) becomes available as trigger variables. You reference them the same way (e.g., ${trigger.incident_id} or ${trigger.severity}) to make decisions or enrich actions. It's designed for incident-response flows where you want to act based on the incident itself.

Incorrect options

❌ C. ON SCHEDULE
This doesn't work for trigger variables from an event/incident. ON_SCHEDULE runs the playbook at set times (like every hour or daily), but there's no incoming "trigger event" or record to provide context—it's just time-based execution. No dynamic data from a specific alert or incident gets passed in automatically. People sometimes think schedules could loop over recent events, but the trigger itself doesn't supply variables like the others do.

❌ D. ON DEMAND
This is manual—someone clicks to run it from the Playbooks list or an incident page. While you can select a record to pass in when starting it (especially if configured to require input), the standard trigger doesn't inherently provide automatic "trigger event" variables from a system-generated event or incident the way EVENT and INCIDENT do. It's more for ad-hoc runs, so the exam distinguishes it here.

Reference
Fortinet Documentation: https://docs.fortinet.com/product/fortianalyzer/7.6

Refer to the exhibit.



You configured a playbook namedFalse Positive Close, and want to run it to verify if it works. However, when you clickExecuteand search for the playbook, you do not see it listed. Which two reasons could be the cause of the problem? (Choose two answers)



A. The playbook must first be published using the Application Editor.


B. Another instance of the playbook is currently executing.


C. The Alerts module is not among the list of modules the playbook can execute on.


D. The manual trigger is configured to require record input to run.





A.
  The playbook must first be published using the Application Editor.

C.
  The Alerts module is not among the list of modules the playbook can execute on.

Explanation:

🔍 Concept summary
This question is about why a FortiSOAR playbook does not appear in the Execute list, even though it exists. When a playbook is missing from the Execute menu, the problem is almost never a runtime issue. It is a visibility and eligibility problem.
For a playbook to appear under Execute in a specific module like Alerts, three things must be true:
🔹 The playbook must be published.
🔹 The playbook must be allowed to run on that module.
🔹 The trigger type must be compatible with how you are trying to run it.
If any of these conditions fail, the playbook is simply hidden from the list.

✅ Correct answers: A and C

✅ A. The playbook must first be published using the Application Editor.
Unpublished playbooks do not appear anywhere outside the editor.
If the playbook is still in Draft state:
🔹 It will not show up in the Execute menu.
🔹 It cannot be triggered manually.
🔹 It cannot be associated with alerts or incidents.
This is a very common oversight when testing new playbooks. Saving is not enough. Publishing is mandatory.

✅ C. The Alerts module is not among the list of modules the playbook can execute on.
Playbooks are module-scoped.
If the playbook is not configured to run on the Alerts module:
🔹 It will not appear when you click Execute from Alerts.
🔹 Even if the playbook is published, it remains invisible in that context.

This typically happens when:
🔹 The playbook was created for Incidents, not Alerts.
🔹 The module selection was skipped or misconfigured.
FortiSOAR does not warn you. It simply hides the playbook.

❌ Incorrect options

❌ B. Another instance of the playbook is currently executing.
This does not prevent the playbook from appearing in the Execute list.
Even if another instance is running:
🔹 The playbook remains visible.
🔹 Execution may fail or queue depending on configuration, but visibility is unaffected.
This option confuses execution control with playbook eligibility.

❌ D. The manual trigger is configured to require record input to run.
This is not the issue here.
When executing from the Alerts module, record input is automatically provided by the selected alert(s). A manual trigger that requires record input is actually expected behavior for alert-based playbooks.
This would only be a problem if you tried to run the playbook outside of any module context, which is not the case in the exhibit.

Reference
Fortinet Documentation: https://docs.fortinet.com

Page 2 out of 9 Pages
NSE7_SOC_AR-7.6 Practice Test Home

Why Prepare with PrepForti NSE7_SOC_AR-7.6 Practice Test?

Choosing the right preparation material is critical for passing the Fortinet NSE 7 - Security Operations 7.6 Architect exam. Here’s how our NSE7_SOC_AR-7.6 practice test is designed to bridge the gap between knowledge and a passing score.

Experience the Real Exam Format:


Familiarize yourself with the exact style, difficulty, and question types you will encounter on the official Fortinet exam. Our NSE 7 - Security Operations 7.6 ArchitectNSE7_SOC_AR-7.6 test questions, like the samples on this page, cover specific technical scenarios and MCQs to ensure there are no surprises on test day.

Turn Knowledge into Application:


The smartest way to prepare isn't just reading - it's practicing. Our NSE 7 - Security Operations 7.6 Architect practice test questions transforms your theoretical understanding into practical problem-solving skills, exactly what is required to pass.

Learn with Detailed Explanations:


All NSE7_SOC_AR-7.6 exam questions comes with a comprehensive summary and a breakdown of why the correct option is right and the others are wrong. This detailed feedback helps you identify your strengths and target your weaknesses, making your NSE 7 - Security Operations 7.6 Architect study time far more efficient.



Experience the Real Exam Now!

Fortinet NSE 7 - Security Operations 7.6 Architect Practice Exam Questions