Download Fortinet NSE 7 - Advanced Threat Protection 2.5.NSE7_ATP-2.5.CertKey.2019-12-04.18q.vcex

Vendor: Fortinet
Exam Code: NSE7_ATP-2.5
Exam Name: Fortinet NSE 7 - Advanced Threat Protection 2.5
Date: Dec 04, 2019
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Examine the FortiSandbox Scan Profile configuration shown in the exhibit, and then answer the following question:
  
Based on the configuration, which of the following statements are true? (Choose two.)
  1. PDF files will be inspected in the WIN7X86VM)16 VM.
  2. URLs submitted using JSON API will not be inspected.
  3. HTM files submitted using the management GUI will be inspected.
  4. DMG files will be inspected in the MACOSX VM.
Correct answer: CD
Question 2
Which samples can FortiClient submit to FortiSandbox for analysis? (Choose two.)
  1. Downloads from emails
  2. URLs from web requests
  3. Command and control traffic
  4. Files from removable storage
Correct answer: AC
Question 3
At which stage of the kill chain will an attacker use tools, such as nmap, ARIN, and banner grabbing, on the targeted organization’s network?
  1. Exploitation
  2. Reconnaissance
  3. Lateral movement
  4. Weaponization
Correct answer: B
Question 4
When using FortiSandbox in sniffer-mode, you should configure FortiSandbox to inspect both inbound and outbound traffic. 
What type of threats can FortiSandbox detect on inbound traffic? (Choose two.)
  1. Botnet connections
  2. Malware
  3. Malicious URLs
  4. Intrusion attempts
Correct answer: AD
Question 5
Which of the advanced threat protection solutions should you use to protect against an attacker may take during the lateral movement stage of the kill chain? (Choose two.)
  1. FortiClient and FortiSandbox
  2. FortiMail and FortiSandbox
  3. FortiGate and FortiSandbox
  4. FortiWeb and FortiSandbox
Correct answer: BD
Question 6
Which advanced threat protection integration solution should you use to protect against out-of-band attack vectors, such as USB drives, used during the delivery stage of the kill chain?
  1. FortiGate and FortiSandbox
  2. FortiMail and FortiSandbox
  3. FortiWeb and FortiSandbox
  4. FortiClient and FortiSandbox
Correct answer: B
Explanation:
Reference: https://www.infosecpartners.com/fortimail-fortisandbox-perfect-partners/
Reference: https://www.infosecpartners.com/fortimail-fortisandbox-perfect-partners/
Question 7
Which of the following advanced threat protection are capable of preventing patient-zero infections? (Choose two.)
  1. FortiWeb and FortiSandbox
  2. FortiClient and FortiSandbox
  3. FortiMail and FortiSandbox
  4. FortiGate and FortiSandbox
Correct answer: AD
Explanation:
FortiGate Enterprise Firewall Platform provides the industry’s highest- performing firewall capabilities, and Fortinet’s FortiGuard Security Subscription Services provide the industry’s highest level of threat research, intelligence, and analytics. Reference: https://www.fortinet.com/content/dam/fortinet/assets/alliances/2019/sb-fortinet-alliances-ziften.pdf
FortiGate Enterprise Firewall Platform provides the industry’s highest- performing firewall capabilities, and Fortinet’s FortiGuard Security Subscription Services provide the industry’s highest level of threat research, intelligence, and analytics. 
Reference: https://www.fortinet.com/content/dam/fortinet/assets/alliances/2019/sb-fortinet-alliances-ziften.pdf
Question 8
Examine the FortiClient configuration shown in the exhibit. then answer the following question:
  
What is the general rule you should follow when configuring the Timeout value for files submitted to FortiSandbox?
  1. It should be long enough for FortiSandbox to complete an antivirus scan of files.
  2. It should be long enough for FortiSandbox to complete a cloud query of file hashes.
  3. It should be long enough for FortiSandbox to complete sandbox analysis of files.
  4. It should be long enough for FortiSandbox to complete a static analysis of files.
Correct answer: C
Explanation:
Reference https://help.fortinet.com/fclient/olh/5-6-6/FortiClient-5.6-Admin/800_Sandbox%20Detection/0605_Config%20submission%20and%20remediation.htm
Reference https://help.fortinet.com/fclient/olh/5-6-6/FortiClient-5.6-Admin/800_Sandbox%20Detection/0605_Config%20submission%20and%20remediation.htm
Question 9
Which FortiSandbox interfaces can you use for sniffer mode? (Choose two.)
  1. port2
  2. port3
  3. port1
  4. port4
Correct answer: BC
Explanation:
FortiSandbox reserves port1 for device management and port3 for scanned files to access the Internet. Port1, port3 Reference: https://help.fortinet.com/fsandbox/olh/2-5-1/Document/900_Scan%20Input/500_Sniffer/100_Sniffer.htm
FortiSandbox reserves port1 for device management and port3 for scanned files to access the Internet. Port1, port3 
Reference: https://help.fortinet.com/fsandbox/olh/2-5-1/Document/900_Scan%20Input/500_Sniffer/100_Sniffer.htm
Question 10
Which threats can FortiSandbox inspect when it is deployed in sniffer mode? (Choose three.)
  1. Spam emails
  2. Known malware
  3. Encrypted files
  4. Malicious URLs
  5. Botnet connections
Correct answer: BDE
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!