FORTIEDR

FORTIEDR

Professional Development

44 Qs

quiz-placeholder

Similar activities

OS CH8_1

OS CH8_1

12th Grade - Professional Development

45 Qs

Sec Study Quiz 5

Sec Study Quiz 5

Professional Development

48 Qs

MS office 2016

MS office 2016

1st Grade - Professional Development

40 Qs

202508500004

202508500004

Professional Development

40 Qs

Java Feature

Java Feature

Professional Development

42 Qs

Excel

Excel

6th Grade - Professional Development

40 Qs

ITF+ Study Quiz 4

ITF+ Study Quiz 4

Professional Development

49 Qs

PC Maintenance Chapter 02 Part 01

PC Maintenance Chapter 02 Part 01

Professional Development

40 Qs

FORTIEDR

FORTIEDR

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Sergio Ortiz

Used 30+ times

FREE Resource

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Threat Hunting feature?

Delete any file from any collector in the organization

Find and delete all instances of a known malicious file or hash in the organization

Identify all instances of a known malicious file or hash and notify affected users

Execute playbooks to isolate affected collectors in the organization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A FortiEDR security event is causing a performance issue with a third-parry application. What must you do first about the event?

Contact Fortinet support

Terminate the process and uninstall the third-party application

Immediately create an exception

Investigate the event to verify whether or not the application is safe

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two types of remote authentication does the FortiEDR management console support?(Choose two.)

Radius

SAML

TACACS

LDAP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does FortiEDR implement post-infection protection?

By preventing data exfiltration or encryption even after a breach occurs

  By using methods used by traditional EDR

By insurance against ransomware

By real-time filtering to prevent malware from executing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the benefit of using file hash along with the file name in a threat hunting repository search?

It helps to make sure the hash is really a malware

It helps to check the malware even if the malware variant uses a different file name

It helps to find if some instances of the hash are actually associated with a different file

It helps locate a file as threat hunting only allows hash search

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An administrator needs to restrict access to the ADMINISTRATION tab in the central manager for a specific account. What role should the administrator assign to this account?

ADMIN

USER

LOCAL ADMIN

REST API

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which connectors can you use for the FortiEDR automated incident response? (Choose two.)

FortiNAC

FortiGate

FortiSiem

FortiSandbox

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?