This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Sat Nov 23 10:01:12 2024 / +0000 GMT ___________________________________________________ Title: [October-2022]NSE5_EDR-5.0 VCE and PDF NSE5_EDR-5.0 30Q Instant Download in Braindump2go[Q1-Q20] --------------------------------------------------- October/2022 Latest Braindump2go NSE5_EDR-5.0 Exam Dumps with PDF and VCE Free Updated Today! Following are some new Braindump2go NSE5_EDR-5.0 Real Exam Questions!Question: 1What is the purpose of the Threat Hunting feature?A. Delete any file from any collector in the organizationB. Find and delete all instances of a known malicious file or hash in the organizationC. Identify all instances of a known malicious file or hash and notify affected usersD. Execute playbooks to isolate affected collectors in the organizationAnswer: CQuestion: 2How does FortiEDR implement post-infection protection?A. By preventing data exfiltration or encryption even after a breach occursB. By using methods used by traditional EDRC. By insurance against ransomwareD. By real-time filtering to prevent malware from executingAnswer: DQuestion: 3Exhibit. Based on the forensics data shown in the exhibit which two statements are true? (Choose two.) A. The device cannot be remediatedB. The event was blocked because the certificate is unsignedC. Device C8092231196 has been isolatedD. The execution prevention policy has blocked this event.Answer: B, CQuestion: 4What is the benefit of using file hash along with the file name in a threat hunting repository search?A. It helps to make sure the hash is really a malwareB. It helps to check the malware even if the malware variant uses a different file nameC. It helps to find if some instances of the hash are actually associated with a different fileD. It helps locate a file as threat hunting only allows hash searchAnswer: C Question: 5Exhibit. Based on the event shown in the exhibit which two statements about the event are true? (Choose two.)A. The device is moved to isolation.B. Playbooks is configured for this event.C. The event has been blockedD. The policy is in simulation modeAnswer: B, DQuestion: 6An administrator needs to restrict access to the ADMINISTRATION tab in the central manager for a specific account.What role should the administrator assign to this account?A. AdminB. UserC. Local AdminD. REST APIAnswer: CQuestion: 7Refer to the exhibit. Based on the event shown in the exhibit, which two statements about the event are true? (Choose two.)A. The NGAV policy has blocked TestApplication exeB. TestApplication exe is sophisticated malwareC. The user was able to launch TestApplication exeD. FCS classified the event as maliciousAnswer: A, BQuestion: 8Refer to the exhibits. The exhibits show the collector state and active connections. The collector is unable to connect to aggregator IP address 10.160.6.100 using default port.Based on the netstat command output what must you do to resolve the connectivity issue?A. Reinstall collector agent and use port 443B. Reinstall collector agent and use port 8081C. Reinstall collector agent and use port 555D. Reinstall collector agent and use port 6514Answer: BQuestion: 9Refer to the exhibits.The exhibits show application policy logs and application details Collector C8092231196 is a member of the Finance groupWhat must an administrator do to block the FileZilia application?A. Deny application in Finance policyB. Assign Finance policy to DBA groupC. Assign Finance policy to Default Collector GroupD. Assign Simulation Communication Control Policy to DBA groupAnswer: D Question: 10Refer to the exhibit. Based on the threat hunting query shown in the exhibit which of the following is true?A. RDP connections will be blocked and classified as suspiciousB. A security event will be triggered when the device attempts a RDP connectionC. This query is included in other organizationsD. The query will only check for network categoryAnswer: BQuestion: 11Which connectors can you use for the FortiEDR automated incident response? (Choose two.)A. FortiNACB. FortiGateC. FortiSiemD. FortiSandboxAnswer: B, CQuestion: 12What is true about classifications assigned by Fortinet Cloud Sen/ice (FCS)?A. The core is responsible for all classifications if FCS playbooks are disabledB. The core only assigns a classification if FCS is not availableC. FCS revises the classification of the core based on its databaseD. FCS is responsible for all classificationsAnswer: CQuestion: 13Refer to the exhibit. Based on the FortiEDR status output shown in the exhibit, which two statements about the FortiEDR collector are true? (Choose two.)A. The collector device has windows firewall enabledB. The collector has been installed with an incorrect port numberC. The collector has been installed with an incorrect registration passwordD. The collector device cannot reach the central managerAnswer: B, DQuestion: 14A company requires a global communication policy for a FortiEDR multi-tenant environment. How can the administrator achieve this?A. An administrator creates a new communication control policy and shares it with other organizationsB. A local administrator creates new a communication control policy and shares it with other organizationsC. A local administrator creates a new communication control policy and assigns it globally to all organizationsD. An administrator creates a new communication control policy for each organizationAnswer: C Question: 15Refer to the exhibit. Based on the event exception shown in the exhibit which two statements about the exception are true? (Choose two)A. A partial exception is applied to this eventB. FCS playbooks is enabled by Fortinet supportC. The exception is applied only on device C8092231196D. The system owner can modify the trigger rules parametersAnswer: A, CQuestion: 16Which two statements are true about the remediation function in the threat hunting module? (Choose two.)A. The file is removed from the affected collectorsB. The threat hunting module sends the user a notification to delete the fileC. The file is quarantinedD. The threat hunting module deletes files from collectors that are currently online.Answer: B, CQuestion: 17Exhibit. Based on the forensics data shown in the exhibit, which two statements are true? (Choose two.)A. An exception has been created for this eventB. The forensics data is displayed m the stacks viewC. The device has been isolatedD. The exfiltration prevention policy has blocked this eventAnswer: C, DQuestion: 18The FortiEDR axe classified an event as inconclusive, out a few seconds later FCS revised the classification to malicious. What playbook actions ate applied to the event?A. Playbook actions applied to inconclusive eventsB. Playbook actions applied to handled eventsC. Playbook actions applied to suspicious eventsD. Playbook actions applied to malicious eventsAnswer: DQuestion: 19Which threat hunting profile is the most resource intensive?A. ComprehensiveB. InventoryC. DefaultD. Standard CollectionAnswer: AQuestion: 20Which two types of remote authentication does the FortiEDR management console support? (Choose two.)A. RadiusB. SAMLC. TACACSD. LDAPAnswer: A, DResources From:1.2022 Latest Braindump2go NSE5_EDR-5.0 Exam Dumps (PDF & VCE) Free Share:https://www.braindump2go.com/nse5-edr-5-0.html2.2022 Latest Braindump2go NSE5_EDR-5.0 PDF and NSE5_EDR-5.0 VCE Dumps Free Share:https://drive.google.com/drive/folders/1CJgO_BfQSuot7WsvGWbiEpNGJwTDPrDd?usp=sharing3.2021 Free Braindump2go NSE5_EDR-5.0 Exam Questions Download:https://www.braindump2go.com/free-online-pdf/NSE5_EDR-5.0-PDF-Dumps(1-20).pdfFree Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams! --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2022-10-14 09:34:24 Post date GMT: 2022-10-14 09:34:24 Post modified date: 2022-10-14 09:34:24 Post modified date GMT: 2022-10-14 09:34:24 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com