Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Fortinet NSE 5 - FortiEDR 5.0 Exam

Last Update 20 hours ago Total Questions : 30

The Fortinet NSE 5 - FortiEDR 5.0 Exam content is now fully updated, with all current exam questions added 20 hours ago. Deciding to include NSE5_EDR-5.0 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our NSE5_EDR-5.0 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these NSE5_EDR-5.0 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Fortinet NSE 5 - FortiEDR 5.0 Exam practice test comfortably within the allotted time.

Question # 4

An administrator needs to restrict access to the ADMINISTRATION tab in the central manager for a specific account.

What role should the administrator assign to this account?

A.

Admin

B.

User

C.

Local Admin

D.

REST API

Question # 5

Refer to the exhibit.

Based on the postman output shown in the exhibit why is the user getting an unauthorized error?

A.

The user has been assigned Admin and Rest API roles

B.

FortiEDR requires a password reset the first time a user logs in

C.

Postman cannot reach the central manager

D.

API access is disabled on the central manager

Question # 6

Which security policy has all of its rules disabled by default?

A.

Device Control

B.

Ransomware Prevention

C.

Execution Prevention

D.

Exfiltration Prevention

Question # 7

The FortiEDR axe classified an event as inconclusive, out a few seconds later FCS revised the classification to malicious. What playbook actions ate applied to the event?

A.

Playbook actions applied to inconclusive events

B.

Playbook actions applied to handled events

C.

Playbook actions applied to suspicious events

D.

Playbook actions applied to malicious events

Question # 8

An administrator finds a third party free software on a user's computer mat does not appear in me application list in the communication control console

Which two statements are true about this situation? (Choose two)

A.

The application is allowed in all communication control policies

B.

The application is ignored as the reputation score is acceptable by the security policy

C.

The application has not made any connection attempts

D.

The application is blocked by the security policies

Question # 9

What is the benefit of using file hash along with the file name in a threat hunting repository search?

A.

It helps to make sure the hash is really a malware

B.

It helps to check the malware even if the malware variant uses a different file name

C.

It helps to find if some instances of the hash are actually associated with a different file

D.

It helps locate a file as threat hunting only allows hash search