What is the purpose of the Threat Hunting feature?
Answer(s): C
How does FortiEDR implement post-infection protection?
Answer(s): A
https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/fortiedr.pdf
Refer to the exhibit.Based on the forensics data shown in the exhibit which two statements are true? (Choose two.)
Answer(s): B,C
What is the benefit of using file hash along with the file name in a threat hunting repository search?
Answer(s): B
Refer to the exhibit.Based on the event shown in the exhibit which two statements about the event are true? (Choose two.)
Answer(s): B,D
Post your Comments and Discuss Fortinet NSE5_EDR-5.0 exam dumps with other Community members:
Amazon SQS
API Gateway
Lambda
usage plan
AWS WAF
Amazon ECS
Application Load Balancer
AWS Global Accelerator
Network Load Balancer
EC2
Auto Scaling group
CloudFront
ALB
AWS PrivateLink
CRR
SSE-S3
Athena
S3
SSE-KMS
RDS Custom for Oracle
s3:GetObject
Amazon OpenSearch Service
CloudWatch Logs
Kinesis Data Firehose
Kinesis
S3 bucket
SQS
AWS Lambda
AWS Secrets Manager
AWS Systems Manager OpsCenter
secretsmanager:GetSecretValue
seq
for h in {1..254}
for h in $(seq 1 254); do
Kinesis Data Streams
Amazon Redshift
secrets:GetSecretValue
aws:PrincipalOrgID
"aws:PrincipalOrgID": "o-1234567890"
Azure Bot Service
Microsoft.Network/applicationSecurityGroups
Microsoft.Network/bastions
Microsoft.Network
COPY INTO
SELECT
COPY INTO @stage/path/file.csv FROM (SELECT col1, col2 FROM my_table WHERE date >= '2024-01-01') FILE_FORMAT=(TYPE=CSV);
Users
External collaboration settings
zone
subinterfaces