Which of the following advanced threat protection are capable of preventing patient-zero infections? (Choose two.)
Which FortiWeb feature supports file submission to FortiSandbox?
Examine the FortiClient configuration shown in the exhibit. then answer the following question:
What is the general rule you should follow when configuring the Timeout value for files submitted to FortiSandbox?
At which stage of the kill chain will an attacker use tools, such as nmap, ARIN, and banner grabbing, on the targeted organization’s network?
Which of the following are FortiWeb’s roles when integrated with FortiSandbox? (Choose two.)
Examine the FortiGate antivirus logs shown in the exhibit, than answer the following question:
Based on the logs shown, which of the following statements is correct? (Choose two.)
Examine the scan job report shown in the exhibit, then answer the following question:
Which of the following statements are true regarding this verdict? (Choose two.)
Which of the kill chain stages does Fortinet’s advanced threat protection solution block? (Choose three.)
FortiSandbox generates structured threat information exchange (STIX) packages for which of the following threats? (Choose two.)