FortiGate root VDOM is authorized and configured to send suspicious files to FortiSandbox for inspection. The administrator creates a new VDOM, and then generates some traffic so that the new VDOM sends a file to FortiSandbox for the first time.
Which of the following is true regarding this scenario?
Correct Answer:
B
Which advanced threat protection integration solution should you use to protect against out-of-band attack vectors, such as USB drives, used during the delivery stage of the kill chain?
Correct Answer:
B
Examine the following topology shown in the exhibit, then answer the following question:
<>
Correct Answer:
AB
Which samples can FortiClient submit to FortiSandbox for analysis? (Choose two.)
Correct Answer:
AC
Which of the advanced threat protection solutions should you use to protect against an attacker may take during the lateral movement stage of the kill chain? (Choose two.)
Correct Answer:
AD