Which security policy has all of its rules disabled by default?
Correct Answer:
B
Which connectors can you use for the FortiEDR automated incident response? (Choose two.)
Correct Answer:
BC
Which two types of remote authentication does the FortiEDR management console support? (Choose two.)
Correct Answer:
AD
What is the purpose of the Threat Hunting feature?
Correct Answer:
C
What is the benefit of using file hash along with the file name in a threat hunting repository search?
Correct Answer:
C