Question 6 of 44

Which security policy has all of its rules disabled by default?

    Correct Answer: C

    The security policy that has all of its rules disabled by default is Device Control. This policy typically includes rules regarding the use and management of external devices like USB drives, and these rules are not enabled by default to allow users flexibility in configuring the controls as needed.

Question 7 of 44

Based on the event shown in the exhibit, which two statements about the event are true? (Choose two.)

    Correct Answer: A, D

    The event is related to Training-eXtended Detection, which operates in simulation mode, and the playbooks are configured for this event, indicated by the device being moved automatically between collector groups.

Question 8 of 44

Which connectors can you use for the FortiEDR automated incident response? (Choose two.)

    Correct Answer: C, D

    The correct connectors for FortiEDR automated incident response are FortiNAC and FortiGate. FortiNAC offers network access control, essential for isolating and controlling endpoints during incident response. FortiGate, a next-generation firewall, provides advanced security measures, traffic control, and threat management, which are crucial for handling security incidents automatically. These integrations enhance FortiEDR’s capabilities for effective incident management.

Question 9 of 44

Which FortiEDR component is required to find malicious files on the entire network of an organization?

    Correct Answer: B

    The FortiEDR Threat Hunting Repository is the component specifically designed to find and delete known malware on any device within the system. It is tailored for the purpose of identifying and eliminating malicious files across the entire network, hence making it the appropriate choice for this function.

Question 10 of 44

Which threat hunting profile is the most resource intensive?

    Correct Answer: B

    The Comprehensive threat hunting profile is the most resource-intensive because it involves collecting almost all data from endpoints. This extensive data collection process requires more resources compared to other profiles, making it the most demanding in terms of resource utilization.