Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A collector attempts to access a known malicious website. FortiEDR is configured for eXtended detection with FortiAnalyzer. What two roles does Fortinet Cloud Services (FCS) perform in this process? (Choose two answers)

A.

FCS sends a log record to FortiAnalyzer.

B.

FCS sends OS metadata to the FortiEDR manager.

C.

FCS correlates and analyzes the collected logs.

D.

FCS identifies if a malicious event has taken place and reports the detection incident.

You added three new applications to FortiEDR using only the Path attribute. What are two expected outcomes of this configuration? (Choose two answers)

A.

These applications will be disabled until explicitly enabled.

B.

Only applications in the specified directory paths will be blocked.

C.

These applications will be blocked only if the file name also matches.

D.

All instances of these applications will be blocked, regardless of location.

You find third-party software on a user’s computer that does not appear in the application list on the communication control console. Which two statements are true about this situation? (Choose two answers)

A.

The application has not made any connection attempts.

B.

The application is blocked by the security policies.

C.

The application is ignored because its reputation score is acceptable to the security policy.

D.

The application is allowed in all communication control policies.

Refer to the exhibits.

What happens when the net user command runs on an endpoint? (Choose one answer)

A.

It triggers an immediate endpoint alert.

B.

It blocks CLI commands by default.

C.

It triggers an incident when the query matches the target process (net.exe).

D.

It triggers FortiEDR rules because the activity is not suspicious.

Which two statements correctly describe the IoT probing process on FortiEDR? (Choose two answers)

A.

Collectors running on servers are always used for IoT probing.

B.

It identifies nearby devices by retrieving details such as hostname and IP address.

C.

Only healthy collectors participate in IoT probing.

D.

It captures all traffic from neighboring devices for deep packet inspection.

An employee leaves the company and no longer has access to the FortiEDR system. You must ensure GDPR compliance regarding the employee’s personal data stored in FortiEDR. Which two data types must be removed to meet GDPR requirements? (Choose two answers)

A.

Device and user name

B.

Installed applications

C.

Installed OS name

D.

IP address and MAC address

Which two Python commands are supported when using FortiEDR Connect to directly access a protected device shell? (Choose two answers)

A.

%upload_file

B.

%ipconfig_all

C.

%psexec

D.

%timestamp

Refer to the exhibit.

Based on the exhibit, which two observations are true? (Choose two answers)

A.

FortiEDR has classified this as suspicious.

B.

This incident has been resolved.

C.

FCS has classified this as malicious.

D.

EDR has never encountered this malware before.

A company requires a global communication policy for a FortiEDR multi-tenant environment. Which recommendation must you make? (Choose one answer)

A.

Create a separate communication control policy for each organization.

B.

Create a new communication control policy and apply it to multiple organizations.

C.

Create a new communication control policy and delegate it to other organizations.

D.

Create a new communication control policy and assign it globally to all organizations.