Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Fortinet NSE7_ATP-2.5 Fortinet NSE 7 - Advanced Threat Protection 2.5 Exam Practice Test

Fortinet NSE 7 - Advanced Threat Protection 2.5 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Examine the Suspicious Indicators section of the scan job shown in the exhibit, then answer the following question:

Which FortiSandbox component identified the vulnerability exploits?

Options:

A.

VM scan

B.

Antivirus scan

C.

Static analysis

D.

Cache check

Question 2

Which of the following actions are performed by FortiSandbox at the static analysis stage?

Options:

A.

All activity is monitored and recorded while the sample is executed in a virtual environment.

B.

The sample’s file type is determined and submitted into the appropriate scan job queue.

C.

The sample behavior is analyzed and embedded objects are extracted for analysis.

D.

Embedded attachments are scanned using the FortiGuard antivirus engine and the latest signature database.

Question 3

Which of the following are FortiWeb’s roles when integrated with FortiSandbox? (Choose two.)

Options:

A.

Share threat information

B.

Prevent outbreaks

C.

Generate a verdict

D.

Block known threats

Question 4

Which FortiSandbox diagnostic command should you use to diagnose Internet connectivity issues on port3?

Options:

A.

ping

B.

tcpdump

C.

test-network

D.

traceroute

Question 5

FortiSandbox generates structured threat information exchange (STIX) packages for which of the following threats? (Choose two.)

Options:

A.

Botnet connections

B.

Malware

C.

Intrusion attempts

D.

Malicious URLs

Question 6

What information does a scan job report include? (Choose two.)

Options:

A.

Updates to the antivirus database

B.

Summary of the file activity

C.

Details about system files deleted of modified

D.

Changes to the FortiSandbox configuration

Question 7

Examine the CLI configuration, than answer the following question:

Which of the following statements is true regarding this FortiMail’s inspection behavior?

Options:

A.

Malicious URLs will be removed by antispam and replaced with a message.

B.

Suspicious files not detected by antivirus will be inspected by FortiSandbox.

C.

Known malicious URLs will be inspected by FortiSandbox.

D.

Files are skipped by content profile will be inspected by FortiSandbox.

Question 8

Which of the advanced threat protection solutions should you use to protect against an attacker may take during the lateral movement stage of the kill chain? (Choose two.)

Options:

A.

FortiClient and FortiSandbox

B.

FortiMail and FortiSandbox

C.

FortiGate and FortiSandbox

D.

FortiWeb and FortiSandbox

Question 9

Examine the virtual Simulator section of the scan job report shown in the exhibit, then answer the following question:

Based on the behavior observed by the virtual simulator, which of the following statements is the most likely scenario?

Options:

A.

The file contained a malicious image file.

B.

The file contained malicious JavaScript.

C.

The file contained a malicious macro.

D.

The file contained a malicious URL.