Download Fortinet.NSE7_ATP-2.5.CertKey.2019-12-04.18q.vcex

Download Exam

File Info

Exam Fortinet NSE 7 - Advanced Threat Protection 2.5
Number NSE7_ATP-2.5
File Name Fortinet.NSE7_ATP-2.5.CertKey.2019-12-04.18q.vcex
Size 1 MB
Posted Dec 04, 2019
Download Fortinet.NSE7_ATP-2.5.CertKey.2019-12-04.18q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Examine the FortiSandbox Scan Profile configuration shown in the exhibit, and then answer the following question:
  
Based on the configuration, which of the following statements are true? (Choose two.)


  1. PDF files will be inspected in the WIN7X86VM)16 VM.
  2. URLs submitted using JSON API will not be inspected.
  3. HTM files submitted using the management GUI will be inspected.
  4. DMG files will be inspected in the MACOSX VM.
Correct answer: CD



Question 2

Which samples can FortiClient submit to FortiSandbox for analysis? (Choose two.)


  1. Downloads from emails
  2. URLs from web requests
  3. Command and control traffic
  4. Files from removable storage
Correct answer: AC



Question 3

At which stage of the kill chain will an attacker use tools, such as nmap, ARIN, and banner grabbing, on the targeted organization’s network?


  1. Exploitation
  2. Reconnaissance
  3. Lateral movement
  4. Weaponization
Correct answer: B



Question 4

When using FortiSandbox in sniffer-mode, you should configure FortiSandbox to inspect both inbound and outbound traffic. 
What type of threats can FortiSandbox detect on inbound traffic? (Choose two.)


  1. Botnet connections
  2. Malware
  3. Malicious URLs
  4. Intrusion attempts
Correct answer: AD



Question 5

Which of the advanced threat protection solutions should you use to protect against an attacker may take during the lateral movement stage of the kill chain? (Choose two.)


  1. FortiClient and FortiSandbox
  2. FortiMail and FortiSandbox
  3. FortiGate and FortiSandbox
  4. FortiWeb and FortiSandbox
Correct answer: BD



Question 6

Which advanced threat protection integration solution should you use to protect against out-of-band attack vectors, such as USB drives, used during the delivery stage of the kill chain?


  1. FortiGate and FortiSandbox
  2. FortiMail and FortiSandbox
  3. FortiWeb and FortiSandbox
  4. FortiClient and FortiSandbox
Correct answer: B
Explanation:
Reference: https://www.infosecpartners.com/fortimail-fortisandbox-perfect-partners/
Reference: https://www.infosecpartners.com/fortimail-fortisandbox-perfect-partners/



Question 7

Which of the following advanced threat protection are capable of preventing patient-zero infections? (Choose two.)


  1. FortiWeb and FortiSandbox
  2. FortiClient and FortiSandbox
  3. FortiMail and FortiSandbox
  4. FortiGate and FortiSandbox
Correct answer: AD
Explanation:
FortiGate Enterprise Firewall Platform provides the industry’s highest- performing firewall capabilities, and Fortinet’s FortiGuard Security Subscription Services provide the industry’s highest level of threat research, intelligence, and analytics. Reference: https://www.fortinet.com/content/dam/fortinet/assets/alliances/2019/sb-fortinet-alliances-ziften.pdf
FortiGate Enterprise Firewall Platform provides the industry’s highest- performing firewall capabilities, and Fortinet’s FortiGuard Security Subscription Services provide the industry’s highest level of threat research, intelligence, and analytics. 
Reference: https://www.fortinet.com/content/dam/fortinet/assets/alliances/2019/sb-fortinet-alliances-ziften.pdf



Question 8

Examine the FortiClient configuration shown in the exhibit. then answer the following question:
  
What is the general rule you should follow when configuring the Timeout value for files submitted to FortiSandbox?


  1. It should be long enough for FortiSandbox to complete an antivirus scan of files.
  2. It should be long enough for FortiSandbox to complete a cloud query of file hashes.
  3. It should be long enough for FortiSandbox to complete sandbox analysis of files.
  4. It should be long enough for FortiSandbox to complete a static analysis of files.
Correct answer: C
Explanation:
Reference https://help.fortinet.com/fclient/olh/5-6-6/FortiClient-5.6-Admin/800_Sandbox%20Detection/0605_Config%20submission%20and%20remediation.htm
Reference https://help.fortinet.com/fclient/olh/5-6-6/FortiClient-5.6-Admin/800_Sandbox%20Detection/0605_Config%20submission%20and%20remediation.htm



Question 9

Which FortiSandbox interfaces can you use for sniffer mode? (Choose two.)


  1. port2
  2. port3
  3. port1
  4. port4
Correct answer: BC
Explanation:
FortiSandbox reserves port1 for device management and port3 for scanned files to access the Internet. Port1, port3 Reference: https://help.fortinet.com/fsandbox/olh/2-5-1/Document/900_Scan%20Input/500_Sniffer/100_Sniffer.htm
FortiSandbox reserves port1 for device management and port3 for scanned files to access the Internet. Port1, port3 
Reference: https://help.fortinet.com/fsandbox/olh/2-5-1/Document/900_Scan%20Input/500_Sniffer/100_Sniffer.htm



Question 10

Which threats can FortiSandbox inspect when it is deployed in sniffer mode? (Choose three.)


  1. Spam emails
  2. Known malware
  3. Encrypted files
  4. Malicious URLs
  5. Botnet connections
Correct answer: BDE









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files