Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibits.

What can you conclude from analyzing the data using the threat hunting module?

A.

Spearphishing is being used to elicit sensitive information.

B.

DNS tunneling is being used to extract confidential data from the local network.

C.

Reconnaissance is being used to gather victim identityinformation from the mail server.

D.

FTP is being used as command-and-control (C&C) technique to mine for data.

Refer to the exhibits.

The Malicious File Detect playbook is configured to create an incident when an event handler generates a malicious file detection event.

Why did the Malicious File Detect playbook execution fail?

A.

The Create Incident task was expecting a name or number as input, but received an incorrect data format

B.

The Get Events task did not retrieve any event data.

C.

The Attach_Data_To_lncident incident task wasexpecting an integer, but received an incorrect data format.

D.

The Attach Data To Incident task failed, which stopped the playbook execution.

Refer to the Exhibit:

An analyst wants to create an incident and generate a report whenever FortiAnalyzer generates a malicious attachment event based on FortiSandbox analysis. The endpoint hosts are protected by FortiClient EMS integrated with FortiSandbox. All devices are logging to FortiAnalyzer.

Which connector must the analyst use in this playbook?

A.

FortiSandbox connector

B.

FortiClient EMS connector

C.

FortiMail connector

D.

Local connector

Review the following incident report:

Attackers leveraged a phishing email campaign targeting your employees.

The email likely impersonated a trusted source, such as the IT department, and requested login credentials.

An unsuspecting employee clicked a malicious link in the email, leading to the download and execution of a Remote Access Trojan (RAT).

The RAT provided the attackers with remote access and a foothold in the compromised system.

Which two MITRE ATT&CK tactics does this incident report capture? (Choose two.)

A.

Initial Access

B.

Defense Evasion

C.

Lateral Movement

D.

Persistence

Refer to Exhibit:

You are tasked with reviewing a new FortiAnalyzer deployment in a network with multiple registered logging devices. There is only one FortiAnalyzer in the topology.

Which potential problem do you observe?

A.

The disk space allocated is insufficient.

B.

The analytics-to-archive ratio is misconfigured.

C.

The analytics retention period is too long.

D.

The archive retention period is too long.

Which statement best describes the MITRE ATT&CK framework?

A.

Itprovides a high-level description of common adversary activities, but lacks technical details

B.

It covers tactics, techniques, and procedures, but does not provide information about mitigations.

C.

It describes attack vectors targeting network devices and servers, but not user endpoints.

D.

It contains some techniques or subtechniques that fall under more than one tactic.

According to the National Institute of Standards and Technology (NIST) cybersecurity framework, incident handling activities can be divided into phases.

In which incident handling phase do you quarantine a compromised host in order to prevent an adversary from using it as a stepping stone to the next phase of an attack?

A.

Containment

B.

Analysis

C.

Eradication

D.

Recovery

A customer wants FortiAnalyzer to run an automation stitch that executes a CLI command on FortiGate to block a predefined list of URLs, if a botnet command-and-control (C&C) server IP is detected.

Which FortiAnalyzer feature must you use to start this automation process?

A.

Playbook

B.

Data selector

C.

Event handler

D.

Connector

Refer to the exhibits.

The DOS attack playbook is configured to create an incident when an event handler generates a denial-of-ser/ice (DoS) attack event.

Why did the DOS attack playbook fail to execute?

A.

The Create SMTP Enumeration incident task is expecting an integer value but is receiving the incorrect data type

B.

The Get Events task is configured to execute in the incorrect order.

C.

The Attach_Data_To_lncident task failed.

D.

The Attach_Data_To_lncident task is expecting an integer value but is receiving the incorrect data type.