Free NSE5_EDR-5.0 Exam Braindumps (page: 1)

Page 1 of 12

What is the purpose of the Threat Hunting feature?

  1. Delete any file from any collector in the organization
  2. Find and delete all instances of a known malicious file or hash in the organization
  3. Identify all instances of a known malicious file or hash and notify affected users
  4. Execute playbooks to isolate affected collectors in the organization

Answer(s): C



How does FortiEDR implement post-infection protection?

  1. By preventing data exfiltration or encryption even after a breach occurs
  2. By using methods used by traditional EDR
  3. By insurance against ransomware
  4. By real-time filtering to prevent malware from executing

Answer(s): A


Reference:

https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/fortiedr.pdf



Refer to the exhibit.



Based on the forensics data shown in the exhibit which two statements are true? (Choose two.)

  1. The device cannot be remediated
  2. The event was blocked because the certificate is unsigned
  3. Device C8092231196 has been isolated
  4. The execution prevention policy has blocked this event.

Answer(s): B,C



What is the benefit of using file hash along with the file name in a threat hunting repository search?

  1. It helps to make sure the hash is really a malware
  2. It helps to check the malware even if the malware variant uses a different file name
  3. It helps to find if some instances of the hash are actually associated with a different file
  4. It helps locate a file as threat hunting only allows hash search

Answer(s): B



Page 1 of 12



Post your Comments and Discuss Fortinet NSE5_EDR-5.0 exam with other Community members:

Geroge commented on November 26, 2024
Providing this service is much appreciated. This free exam dumps is helping me a lot.
Romania
upvote