A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)
Which two ports must be open between FortiSOAR HA nodes'* (Choose two.)
Several users have informed you that the FortiSOAR GUI Is not reachable. When troubleshooting, which step should you take first?
Refer to the exhibit.

The former primary node was relegated to the secondary rote but is stuck in the Faulted state.
Which two steps must you take to restore operation in the high availability (HA) cluster? (Choose two.)
For which two modules on FortiSOAR can you create SLA templates7 (Choose two.)
Which product is essential to level 3 of the SOC automation model?
An administrator wants to collect and review all FortiSOAR log tiles to troubleshoot an issue. Which two methods can they use to accomplish this? (Choose two.)
Which two relationship types are configurable on FortiSOAR?
(Choose two.)
On FortiSOAR. which default role is used to assign privileges to other teams and is recommended to not be removed?
View the exhibit:
What does the command output mean?
