Fortinet NSE 5 - FortiEDR 5.0 NSE5_EDR-5.0 Exam Questions in PDF

Free Fortinet NSE5_EDR-5.0 Dumps Questions (page: 2)

An administrator needs to restrict access to the ADMINISTRATION tab in the central manager for a specific account. What role should the administrator assign to this account?

  1. Admin
  2. User
  3. Local Admin
  4. REST API

Answer(s): C



Refer to the exhibit.



Based on the event shown in the exhibit, which two statements about the event are true? (Choose two.)

  1. The NGAV policy has blocked TestApplication exe
  2. TestApplication exe is sophisticated malware
  3. The user was able to launch TestApplication exe
  4. FCS classified the event as malicious

Answer(s): A,B



Refer to the exhibits.





The exhibits show the collector state and active connections. The collector is unable to connect to aggregator IP address 10.160.6.100 using default port. Based on the netstat command output what must you do to resolve the connectivity issue?

  1. Reinstall collector agent and use port 443
  2. Reinstall collector agent and use port 8081
  3. Reinstall collector agent and use port 555
  4. Reinstall collector agent and use port 6514

Answer(s): B



Refer to the exhibits.





The exhibits show application policy logs and application details. Collector C8092231196 is a member of the Finance group. What must an administrator do to block the FileZilia application?

  1. Deny application in Finance policy
  2. Assign Finance policy to DBA group
  3. Assign Finance policy to Default Collector Group
  4. Assign Simulation Communication Control Policy to DBA group

Answer(s): A



Refer to the exhibit.



Based on the threat hunting query shown in the exhibit which of the following is true?

  1. RDP connections will be blocked and classified as suspicious
  2. A security event will be triggered when the device attempts a RDP connection
  3. This query is included in other organizations
  4. The query will only check for network category

Answer(s): A



Share your comments for Fortinet NSE5_EDR-5.0 exam with other users:

P
ph
6/16/2023 12:41:00 AM

very legible

S
sephs2001
7/31/2023 10:42:00 PM

is this exam accurate or helpful?

A
ash
7/11/2023 3:00:00 AM

please upload dump, i have exam in 2 days

S
Sneha
8/17/2023 6:29:00 PM

this is useful

S
sachin
12/27/2023 2:45:00 PM

question 232 answer should be perimeter not netowrk layer. wrong answer selected

T
tomAws
7/18/2023 5:05:00 AM

nice questions

R
Rahul
6/11/2023 2:07:00 AM

hi team, could you please provide this dump ?

T
TeamOraTech
12/5/2023 9:49:00 AM

very helpful to clear the exam and understand the concept.

C
Curtis
7/12/2023 8:20:00 PM

i think it is great that you are helping people when they need it. thanks.

S
sam
7/17/2023 6:22:00 PM

cannot evaluate yet

N
nutz
7/20/2023 1:54:00 AM

a laptops wireless antenna is most likely located in the bezel of the lid

R
rajesh soni
1/17/2024 6:53:00 AM

good examplae to learn basic

T
Tanya
10/25/2023 7:07:00 AM

this is useful information

N
Nasir Mahmood
12/11/2023 7:32:00 AM

looks usefull

J
Jason
9/30/2023 1:07:00 PM

question 81 should be c.

T
TestPD1
8/10/2023 12:22:00 PM

question 18 : response isnt a ?

A
ally
8/19/2023 5:31:00 PM

plaese add questions

D
DIA
10/7/2023 5:59:00 AM

is dumps still valid ?

A
Annie
7/7/2023 8:33:00 AM

thanks for this

A
arnie
9/17/2023 6:38:00 AM

please upload questions

T
Tanuj Rana
7/22/2023 2:33:00 AM

please upload the question dump for professional machinelearning

F
Future practitioner
8/10/2023 1:26:00 PM

question 4 answer is c. this site shows the correct answer as b. "adopt a consumption model" is clearly a cost optimization design principle. looks like im done using this site to study!!!

A
Ace
8/3/2023 10:37:00 AM

number 52 answer is d

N
Nathan
12/17/2023 12:04:00 PM

just started preparing for my exam , and this site is so much help

C
Corey
12/29/2023 5:06:00 PM

question 35 is incorrect, the correct answer is c, it even states so: explanation: when a vm is infected with ransomware, you should not restore the vm to the infected vm. this is because the ransomware will still be present on the vm, and it will encrypt the files again. you should also not restore the vm to any vm within the companys subscription. this is because the ransomware could spread to other vms in the subscription. the best way to restore a vm that is infected with ransomware is to restore it to a new azure vm. this will ensure that the ransomware is not present on the new vm.

R
Rajender
10/18/2023 3:54:00 AM

i would like to take psm1 exam.

B
Blessious Phiri
8/14/2023 9:53:00 AM

cbd and pdb are key to the database

A
Alkaed
10/19/2022 10:41:00 AM

the purchase and download process is very much streamlined. the xengine application is very nice and user-friendly but there is always room for improvement.

D
Dave Gregen
9/4/2023 3:17:00 PM

please upload p_sapea_2023

S
Sarah
6/13/2023 1:42:00 PM

anyone use this? the question dont seem to follow other formats and terminology i have been studying im getting worried

S
Shuv
10/3/2023 8:19:00 AM

good questions

R
Reb974
8/5/2023 1:44:00 AM

hello are these questions valid for ms-102

M
Mchal
7/20/2023 3:38:00 AM

some questions are wrongly answered but its good nonetheless

S
Sonbir
8/8/2023 1:04:00 PM

how to get system serial number using intune

AI Tutor 👋 I’m here to help!