Which scripting language is supported by the FortiEDR action managed?
A. TCL
B. Python
C. Perl
D. Bash
Which connectors can you use for the FortiEDR automated incident response? (Choose two.)
A. FortiNAC
B. FortiGate
C. FortiSiem
D. FortiSandbox
Which threat hunting profile is the most resource intensive?
A. Comprehensive
B. Inventory
C. Default
D. Standard Collection
Exhibit.
Based on the forensics data shown in the exhibit, which two statements are true? (Choose two.)
A. An exception has been created for this event
B. The forensics data is displayed m the stacks view
C. The device has been isolated
D. The exfiltration prevention policy has blocked this event
Refer to the exhibit.
Based on the FortiEDR status output shown in the exhibit, which two statements about the FortiEDR collector are true? (Choose two.)
A. The collector device has windows firewall enabled
B. The collector has been installed with an incorrect port number
C. The collector has been installed with an incorrect registration password
D. The collector device cannot reach the central manager
Refer to the exhibit.
Based on the postman output shown in the exhibit why is the user getting an unauthorized error?
A. The user has been assigned Admin and Rest API roles
B. FortiEDR requires a password reset the first time a user logs in
C. Postman cannot reach the central manager
D. API access is disabled on the central manager
Which two statements are true about the remediation function in the threat hunting module? (Choose two.)
A. The file is removed from the affected collectors
B. The threat hunting module sends the user a notification to delete the file
C. The file is quarantined
D. The threat hunting module deletes files from collectors that are currently online.
When installing a FortiEDR collector, why is a `Registration Password' for collectors needed?
A. To restrict installation and uninstallation of collectors
B. To verify Fortinet support request
C. To restrict access to the management console
D. To verify new group assignment
Which two types of traffic are allowed while the device is in isolation mode? (Choose two.)
A. Outgoing SSH connections
B. HTTP sessions
C. ICMP sessions D. Incoming RDP connections
An administrator finds that a newly installed collector does not display on the INVENTORY tab in the central manager.
What two troubleshooting steps must the administrator perform? (Choose two.)
A. Export the collector logs from the central manager.
B. Verify the central manager has connectivity to FCS.
C. Verify TCP ports 8081 and 555 are open.
D. Check if the FortiEDR services are running on the collector device.