Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet FCP_FSA_AD-5.0 FCP - FortiSandbox 5.0 Administrator Exam Practice Test

FCP - FortiSandbox 5.0 Administrator Questions and Answers

Question 1

A FortiGate root VDOM is authorized on FortiSandbox, and FortiGate is configured to send suspicious files to FortiSandbox for inspection. You create a new VDOM and then generates some traffic so that the new VDOM sends a file to FortiSandbox for the first time. In this scenario, which action will FortiSandbox take? (Choose one answer)

Options:

A.

FortiSandbox will inspect all files, based on the root VDOM authorization state and configuration.

B.

FortiSandbox will accept the file, but not inspect the file until the administrator manually authorizes the new VDOM on FortiSandbox.

C.

FortiSandbox will authorize the new VDOM by default and inspect files as they are received.

D.

FortiSandbox will accept the file; but not inspect the file until the administrator manually configures the new VDOM on FortiSandbox.

Question 2

Refer to the exhibit.

Question # 2

A network topology is shown. Which two important steps must you take before you enable a BCC adapter on FortiSandbox? (Choose two answers)

Options:

A.

Configure the upstream SEG to extract files and URLs from emails and send them to FortiSandbox for analysis.

B.

Configure an A record on the DNS server for the FortiSandbox IP.

C.

Configure the sub-domain on the upstream SEG to BCC emails to FortiSandbox.

D.

Add an MX record on the DNS server for the BCC email sub-domain to resolve to the FortiSandbox IP.

Question 3

A security analyst is reviewing a scan job report that indicates a true positive match. The job report displays that the malware attempts to replace vital system executables. Which type of malware is the analyst observing? (Choose one answer)

Options:

A.

Exploit

B.

Trojan

C.

Dropper

D.

Rootkit

Question 4

To assign a file to a VM image, which two conditions must be true? (Choose two answers)

Options:

A.

FortiSandbox must have the appropriate license entitlements.

B.

The VM image clone value must be a non-zero number.

C.

The file type must be configured to enter the job queue.

D.

The VM image must have the software required to open the file.

Question 5

A FortiSandbox VM has been deployed and has been functioning correctly for several months. Suddenly, the system begins rejecting file submissions with an error message indicating a licensing problem. How can you determine, using the CLI, if the license is still valid? (Choose one answer)

Options:

A.

vm-status

B.

hc-setting -1

C.

vm-license -1

D.

status

Question 6

Refer to the exhibit.

Question # 6

Which two inspections will FortiSandbox perform on samples submitted for sandboxing? (Choose two answers)

Options:

A.

IP reputation check on callback connections

B.

Antivirus inspection on downloaded files

C.

URL rating on HTTP GET requests

D.

URL rating on FQDN seen in DNS requests

Question 7

You determine that there are a large number of samples on FortiSandbox that are obsolete and no longer needed for future analysis. Which CLI tool must you use to remediate this issue? (Choose one answer)

Options:

A.

log-purge

B.

factory-reset

C.

cleandb

D.

fsck-storage

Question 8

Which three actions does FortiSandbox perform when it is integrated with FortiMail for advanced threat protection (ATP)? (Choose three answers)

Options:

A.

It updates FortiGuard databases.

B.

It assigns and returns a rating for analyzed objects.

C.

It submits objects for sandbox scanning.

D.

It analyzes file and URL objects.

E.

It queues email during analysis.

Question 9

You must increase the scanning capacity of a FortiSandbox device by increasing the number of clones, but the FortiSandbox local clone limit is already at maximum. Which two actions can you take to expand the scanning capacity of the unit? (Choose two answers)

Options:

A.

Deploy remote WindowsCloudVM and MACOSX clones

B.

Reorganize the scan priority list

C.

Add custom VMs

D.

Add VM licenses to FortiSandbox

Question 10

Refer to the exhibit.

Question # 10

Which command must you use to configure the secondary node? (Choose one answer)

Options:

A.

hc-worker -a -s10.25.1.30 -p < password >

B.

hc-worker -a -s10.50.1.30 -p < password >

C.

hc-worker -a -s10.50.1.40 -p < password >

D.

hc-worker -a -s10.25.1.50 -p < password >

Question 11

You are troubleshooting long delays between FortiMail file submissions to FortiSandbox and verdicts being returned form FortiSandbox. Which FortiMail debug tool must you use to troubleshoot this issue further? (Choose one answer)

Options:

A.

diagnose debug application hoststatd

B.

diagnose debug application deferd

C.

diagnose debug application oftpd

D.

diagnose debug application mailfilterd

Question 12

You notice a recent file downloaded by some end stations is exhibiting malware behavior, however, on the sandbox the file is rated clean. After further investigation you determine that only end stations using the Opera browser are being affected. What must you do to prevent these infections? (Choose one answer)

Options:

A.

Enable the STIX/TAXII Integration setting on FortiSandbox.

B.

Configure a custom VM to use the same browser as the exploited end stations.

C.

Modify the scan profile to include the malware file type.

D.

Change the job queue priority to process web-based files first.