Refer to the exhibit.
Based on the event shown in the exhibit, which two statements about the event are true? (Choose two.)
A. The NGAV policy has blocked TestApplication exe
B. TestApplication exe is sophisticated malware
C. The user was able to launch TestApplication exe
D. FCS classified the event as malicious
Which security policy has all of its rules disabled by default?
A. Device Control
B. Ransomware Prevention
C. Execution Prevention
D. Exfiltration Prevention
Which connectors can you use for the FortiEDR automated incident response? (Choose two.)
A. FortiNAC
B. FortiGate
C. FortiSiem
D. FortiSandbox
Exhibit.
Based on the forensics data shown in the exhibit which two statements are true? (Choose two.)
A. The device cannot be remediated
B. The event was blocked because the certificate is unsigned
C. Device C8092231196 has been isolated
D. The execution prevention policy has blocked this event.
What is the benefit of using file hash along with the file name in a threat hunting repository search?
A. It helps to make sure the hash is really a malware
B. It helps to check the malware even if the malware variant uses a different file name
C. It helps to find if some instances of the hash are actually associated with a different file
D. It helps locate a file as threat hunting only allows hash search
Which two statements are true about the remediation function in the threat hunting module? (Choose two.)
A. The file is removed from the affected collectors
B. The threat hunting module sends the user a notification to delete the file
C. The file is quarantined
D. The threat hunting module deletes files from collectors that are currently online.
Which three steps does FortiXDR perform to find and prevent cyberattacks? (Choose three.)
A. Extended analysis
B. Extended detection
C. Extended discovery
D. Extended investigation
E. Extended response
Which two criteria are requirements of integrating FortiEDR into the Fortinet Security Fabric? (Choose two.)
A. Core with Core only functionality
B. A Forensics add-on license
C. Central Manager connected to FCS
D. A valid API user with access to connectors
When installing a FortiEDR collector, why is a `Registration Password' for collectors needed?
A. To restrict installation and uninstallation of collectors
B. To verify Fortinet support request
C. To restrict access to the management console
D. To verify new group assignment
Which two types of traffic are allowed while the device is in isolation mode? (Choose two.)
A. Outgoing SSH connections
B. HTTP sessions
C. ICMP sessions D. Incoming RDP connections