Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

FCP - FortiSandbox 5.0 Administrator

Last Update 2 hours ago Total Questions : 42

The FCP - FortiSandbox 5.0 Administrator content is now fully updated, with all current exam questions added 2 hours ago. Deciding to include FCP_FSA_AD-5.0 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our FCP_FSA_AD-5.0 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these FCP_FSA_AD-5.0 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any FCP - FortiSandbox 5.0 Administrator practice test comfortably within the allotted time.

Question # 4

You are asked to configure a FortiSandbox HA cluster. Port 4 on the primary and secondary nodes is dedicated for HA-specific communication. Which command must you use to configure the secondary node? (Choose one answer)

A.

hc-settings -sc -tN -nSecondaryNode -cFSAGrp -p < password > -iport4

B.

hc-settings -sc -tM -nSecondaryNode -cFSAGrp -p < password > -iport4

C.

hc-settings -sc -tP -nSecondaryNode -cFSAGrp -p < password > -iport4

D.

hc-settings -sc -tR -nSecondaryNode -cFSAGrp -p < password > -iport4

Question # 5

Refer to the exhibit.

A network topology is shown. Which two important steps must you take before you enable a BCC adapter on FortiSandbox? (Choose two answers)

A.

Configure the upstream SEG to extract files and URLs from emails and send them to FortiSandbox for analysis.

B.

Configure an A record on the DNS server for the FortiSandbox IP.

C.

Configure the sub-domain on the upstream SEG to BCC emails to FortiSandbox.

D.

Add an MX record on the DNS server for the BCC email sub-domain to resolve to the FortiSandbox IP.

Question # 6

A FortiGate root VDOM is authorized on FortiSandbox, and FortiGate is configured to send suspicious files to FortiSandbox for inspection. You create a new VDOM and then generates some traffic so that the new VDOM sends a file to FortiSandbox for the first time. In this scenario, which action will FortiSandbox take? (Choose one answer)

A.

FortiSandbox will inspect all files, based on the root VDOM authorization state and configuration.

B.

FortiSandbox will accept the file, but not inspect the file until the administrator manually authorizes the new VDOM on FortiSandbox.

C.

FortiSandbox will authorize the new VDOM by default and inspect files as they are received.

D.

FortiSandbox will accept the file; but not inspect the file until the administrator manually configures the new VDOM on FortiSandbox.

Question # 7

You determine that there are a large number of samples on FortiSandbox that are obsolete and no longer needed for future analysis. Which CLI tool must you use to remediate this issue? (Choose one answer)

A.

log-purge

B.

factory-reset

C.

cleandb

D.

fsck-storage

Question # 8

You are asked to configure a FortiSandbox HA cluster. Port 4 on the primary and secondary nodes is dedicated for HA-specific communication. Which command must you use to configure the primary node? (Choose one answer)

A.

hc-settings -sc -tN -nPrimaryNode -cFSAGrp -p -iport4

B.

hc-settings -sc -tR -nPrimaryNode -cFSAGrp -p -iport4

C.

hc-settings -sc -tF -nPrimaryNode -cFSAGrp -p -iport4

D.

hc-settings -sc -tM -nPrimaryNode -cFSAGrp -p -iport4

Question # 9

Refer to the exhibits.

You are asked to configure a FortiSandbox to leverage the real-time anti-phishing (RTAP) feature. After configuring the scan profile, testing shows that URLs are not being submitted to the RTAP service. What could cause this issue? (Choose one answer)

A.

The URL option is not selected as a Web file type.

B.

The WEBLink file type is not selected in the profile.

C.

The VM scan timeout for URLs should be at least 300 to provide enough time for a FortiGuard response.

D.

The URLs are not designated for active content pre-scan.

Question # 10

Refer to the exhibit.

Which two statements about the scanned file are true? (Choose two answers)

A.

The advanced AI feature identified the threat.

B.

The URL was identified as a known malicious URL.

C.

The analysis resulted are defined.

D.

The analysis resulted in a malicious verdict.

Go to page: