Which of the advanced threat protection solutions should you use to protect against an attacker may take during the lateral movement stage of the kill chain? (Choose two.)
Which of the following are features of network share scanning of FortiSandbox? (Choose two.)
When using FortiSandbox in sniffer-mode, you should configure FortiSandbox to inspect both inbound and outbound traffic.
What type of threats can FortiSandbox detect on inbound traffic? (Choose two.)
Examine the FortiClient configuration shown in the exhibit. then answer the following question:
What is the general rule you should follow when configuring the Timeout value for files submitted to FortiSandbox?
Examine the following topology shown in the exhibit, then answer the following question:
Which of the following configuration tasks are applicable to secure Webserver from known threats? (Choose two.)
Which FortiSandbox interfaces can you use for sniffer mode? (Choose two.)
Which samples can FortiClient submit to FortiSandbox for analysis? (Choose two.)
Which of the following are FortiWeb’s roles when integrated with FortiSandbox? (Choose two.)
Which FortiSandbox diagnostic command should you use to diagnose Internet connectivity issues on port3?