Demo Questions:
Question: 1
Which samples can FortiClient submit to FortiSandbox for analysis? (Choose two.)
A. Downloads from emails
B. URLs from web requests
C. Command and control traffic
D. Files from removable storage
Answer: A,C
Question: 2
At which stage of the kill chain will an attacker use tools, such as nmap, ARIN, and banner grabbing,
on the targeted organization’s network?
A. Exploitation
B. Reconnaissance
C. Lateral movement
D. Weaponization
Answer: B
Question: 3
FortiGate root VDOM is authorized and configured...