Q1. What is the purpose of the Threat Hunting feature?
A.Delete any file from any collector in the organization
B. Find and delete all instances of a known malicious file or hash in the organization
C. Identify all instances of a known malicious file or hash and notify affected users
D. Execute playbooks to isolate affected collectors in the organization
Correct Answer: C
Q2. How does FortiEDR implement post-infection protection?
A.By preventing data exfiltration or encryption even after a breach occurs
B. By using methods used by traditional EDR
C. By insurance against ransomware
D. By real-time filtering to prevent malware from executing
Correct Answer: D
Q3. What is the benefit of using file hash along with the file name in a threat hunting repository search?
A.It helps to make sure the hash is really a malware
B. It helps to check the malware even if the malware variant uses a different file name
C. It helps to find if some instances of the hash are actually associated with a different file
D. It helps locate a file as threat hunting only allows hash search
Correct Answer: C
$ 39
Reviews
There are no reviews yet.