Refer to the exhibit.
Based on the event shown in the exhibit, which two statements about the event are true? (Choose two.)
A. The NGAV policy has blocked TestApplication exe
B. TestApplication exe is sophisticated malware
C. The user was able to launch TestApplication exe
D. FCS classified the event as malicious
Which scripting language is supported by the FortiEDR action managed?
A. TCL
B. Python
C. Perl
D. Bash
Which security policy has all of its rules disabled by default?
A. Device Control
B. Ransomware Prevention
C. Execution Prevention
D. Exfiltration Prevention
Which connectors can you use for the FortiEDR automated incident response? (Choose two.)
A. FortiNAC
B. FortiGate
C. FortiSiem
D. FortiSandbox
What is the role of a collector in the communication control policy?
A. A collector blocks unsafe applications from running
B. A collector is used to change the reputation score of any application that collector runs
C. A collector records applications that communicate externally
D. A collector can quarantine unsafe applications from communicating
A company requires a global communication policy for a FortiEDR multi-tenant environment.
How can the administrator achieve this?
A. An administrator creates a new communication control policy and shares it with other organizations
B. A local administrator creates new a communication control policy and shares it with other organizations
C. A local administrator creates a new communication control policy and assigns it globally to all organizations
D. An administrator creates a new communication control policy for each organization
Which two statements are true about the remediation function in the threat hunting module? (Choose two.)
A. The file is removed from the affected collectors
B. The threat hunting module sends the user a notification to delete the file
C. The file is quarantined
D. The threat hunting module deletes files from collectors that are currently online.
Which three steps does FortiXDR perform to find and prevent cyberattacks? (Choose three.)
A. Extended analysis
B. Extended detection
C. Extended discovery
D. Extended investigation
E. Extended response
Which statement is true about the flow analyzer view in forensics?
A. It displays a graphic flow diagram.
B. Two events can be compared side-by-side.
C. It shows details about processes and sub processes.
D. The stack memory of a specific device can be retrieved
A company requires a global exception for a FortiEDR multi-tenant environment.
How can the administrator achieve this?
A. The local administrator can create a new exception and share it with other organizations.
B. A user account can create a new exception and share it with other organizations.
C. The administrator can create a new exception and assign it globally to all organizations.
D. The administrator can create a new exception policy for each organization hosted on FortiEDR.