Examine the FortiSandbox Scan Profile configuration shown in the exhibit, and then answer the following question:
Based on the configuration, which of the following statements are true? (Choose two.)
A. PDF files will be inspected in the WIN7X86VM)16 VM.
B. URLs submitted using JSON API will not be inspected.
C. HTM files submitted using the management GUI will be inspected.
D. DMG files will be inspected in the MACOSX VM.
Examine the FortiGate antivirus logs shown in the exhibit, than answer the following question:
Based on the logs shown, which of the following statements is correct? (Choose two.)
A. The fsa_dropper.exe file was blocked using a local black list entry.
B. The fsa_sample_1.exe file was not sent to FortiSandbox.
C. The eicar.exe file was blocked using a FortiGiard generated signature.
D. The fsa_downloader.exe file was not blocked by FortiGate.
At which stage of the kill chain will an attacker use tools, such as nmap, ARIN, and banner grabbing, on the targeted organization's network?
A. Exploitation
B. Reconnaissance
C. Lateral movement
D. Weaponization
When using FortiSandbox in sniffer-mode, you should configure FortiSandbox to inspect both inbound and outbound traffic.
What type of threats can FortiSandbox detect on inbound traffic? (Choose two.)
A. Botnet connections
B. Malware
C. Malicious URLs
D. Intrusion attempts
FortiSandbox generates structured threat information exchange (STIX) packages for which of the following threats? (Choose two.)
A. Botnet connections
B. Malware
C. Intrusion attempts
D. Malicious URLs
Which FortiSandbox interfaces can you use for sniffer mode? (Choose two.)
A. port2
B. port3
C. port1
D. port4
What information does a scan job report include? (Choose two.)
A. Updates to the antivirus database
B. Summary of the file activity
C. Details about system files deleted of modified
D. Changes to the FortiSandbox configuration
Examine the FortiGate antivirus log detail shown in the exhibit, then answer the following question:
Which of the following statements is true?
A. FortiGate quarantined the file as a malware.
B. The file matched a FortiSandbox-generated malware signature.
C. The file was downloaded from www.fortinet.com.
D. The FSA/RISK_HIGH verdict was generated by FortiSandbox.
Examine the virtual Simulator section of the scan job report shown in the exhibit, then answer the following question:
Based on the behavior observed by the virtual simulator, which of the following statements is the most likely scenario?
A. The file contained a malicious image file.
B. The file contained malicious JavaScript.
C. The file contained a malicious macro.
D. The file contained a malicious URL.
Examine the scan job report shown in the exhibit, then answer the following question: Which of the following statements are true regarding this verdict? (Choose two.)
A. The file contained malicious JavaScipt.
B. The file contained a malicious macro.
C. The file was sandboxed in two-guest VMs.
D. The file was extracted using sniffer-mode inspection.