Which of the following are FortiWeb's roles when integrated with FortiSandbox? (Choose two.)
A. Share threat information
B. Prevent outbreaks
C. Generate a verdict
D. Block known threats
Examine the FortiSandbox configuration on FortiMail shown in the exhibit, then answer the following question:
What does the Scan result expires in value specify?
A. How often the local scam results cache will expire on FortiMail.
B. How long FortiMail will wait to send a file or URI to FortiSandbox.
C. How long FortiMail will wait for a scan result from FortiSandbox.
D. How long FortiMail will query FortiSandbox for a scan result.
Examine the following topology shown in the exhibit, then answer the following question: Which of the following configuration tasks are applicable to secure Webserver from known threats? (Choose two.)
A. Apply an SSL inspection profile configured for protecting SSL server.
B. Apply an antivirus profile to the port1 -> port2 firewall policy.
C. Apply an SSL inspection profile configured for full SSL inspection.
D. Apply a web filter profile to the port1 -> port2 firewall policy.
Examine the virtual Simulator section of the scan job report shown in the exhibit, then answer the following question:
Based on the behavior observed by the virtual simulator, which of the following statements is the most likely scenario?
A. The file contained a malicious image file.
B. The file contained malicious JavaScript.
C. The file contained a malicious macro.
D. The file contained a malicious URL.
Examine the scan job report shown in the exhibit, then answer the following question: Which of the following statements are true regarding this verdict? (Choose two.)
A. The file contained malicious JavaScipt.
B. The file contained a malicious macro.
C. The file was sandboxed in two-guest VMs.
D. The file was extracted using sniffer-mode inspection.
Which of the following actions are performed by FortiSandbox at the static analysis stage?
A. All activity is monitored and recorded while the sample is executed in a virtual environment.
B. The sample's file type is determined and submitted into the appropriate scan job queue.
C. The sample behavior is analyzed and embedded objects are extracted for analysis.
D. Embedded attachments are scanned using the FortiGuard antivirus engine and the latest signature database.
Examine the FortiGate antivirus log detail shown in the exhibit, then answer the following question:
Which of the following statements is true?
A. FortiGate quarantined the file as a malware.
B. The file matched a FortiSandbox-generated malware signature.
C. The file was downloaded from www.fortinet.com.
D. The FSA/RISK_HIGH verdict was generated by FortiSandbox.
Which FortiWeb feature supports file submission to FortiSandbox?
A. Attack signature
B. Credential stuffing defense
C. IP reputation
D. File security
FortiSandbox generates structured threat information exchange (STIX) packages for which of the following threats? (Choose two.)
A. Botnet connections
B. Malware
C. Intrusion attempts
D. Malicious URLs
Which FortiSandbox interfaces can you use for sniffer mode? (Choose two.)
A. port2
B. port3
C. port1
D. port4
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Fortinet exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your NSE7_ATP-2.5 exam preparations and Fortinet certification application, do not hesitate to visit our Vcedump.com to find your solutions here.