Fortinet FCSS_NST_SE-7.4 Exam Dumps and Practice Test Questions Set12 Q166-180

Fortinet FCSS_NST_SE-7.4 Exam Dumps and Practice Test Questions Set12 Q166-180

Visit here for our full Fortinet FCSS_NST_SE-7.4 exam dumps and practice test questions.

Question 166:

How does FortiNDR detect malicious use of legitimate remote desktop gateway or jump server infrastructure?

A) All gateway usage is authorized remote access

B) It identifies unusual remote access patterns, suspicious sessions through gateways, or abuse of jump servers for lateral movement

C) Gateway traffic cannot reveal security threats

D) Remote access infrastructure is inherently secure

Answer: B

Explanation:

FortiNDR identifies unusual remote access patterns, suspicious sessions through gateways, or abuse of jump servers for lateral movement by monitoring traffic through remote access infrastructure and detecting usage patterns revealing compromised accounts, unauthorized access, or attackers leveraging legitimate remote access channels for malicious purposes.

Remote access infrastructure monitoring detects multiple threat patterns including detecting gateway usage from unexpected geographic locations, identifying unusual session durations or access times, recognizing access to unexpected internal resources through gateways, detecting compromised accounts accessing jump servers, identifying lateral movement through jump server infrastructure, recognizing unusual volumes of connections through gateways, and detecting session characteristics inconsistent with normal remote worker patterns. For example, detecting remote desktop gateway session from foreign country accessing internal database servers and domain controllers at 3 AM when legitimate user normally works daytime hours from domestic location indicates compromised credentials being used for malicious access through legitimate remote access infrastructure.

A is incorrect because gateway usage can indicate compromised accounts, unauthorized access, or malicious activities requiring monitoring beyond assuming all usage is authorized. C is incorrect because gateway traffic exhibits patterns revealing unusual access, compromised accounts, and malicious activities through behavioral analysis. D is incorrect because remote access infrastructure can be compromised or abused requiring security monitoring to detect unauthorized usage and attacks.

Organizations should monitor remote access gateway and jump server usage for unusual patterns, establish baselines for normal remote access behaviors including typical sources and accessed resources, configure alerts for suspicious gateway sessions particularly from unexpected locations or accessing unusual resources, implement multi-factor authentication for remote access alongside monitoring, and investigate detected gateway anomalies as potential compromised credentials requiring immediate credential rotation and access review.

Question 167:

What role does monitoring for unusual graph database query patterns play in FortiNDR security?

A) Graph databases are never targeted by attackers

B) It identifies suspicious Cypher, Gremlin, or SPARQL queries suggesting reconnaissance, privilege escalation path discovery, or data theft

C) Graph database traffic cannot be monitored for security

D) All graph queries are legitimate data analysis

Answer: B

Explanation:

FortiNDR identifies suspicious Cypher, Gremlin, or SPARQL queries suggesting reconnaissance, privilege escalation path discovery, or data theft by monitoring graph database protocol traffic for query patterns revealing attackers leveraging graph databases to map relationships, discover attack paths, or exfiltrate interconnected data.

Graph database monitoring detects multiple threat patterns including detecting queries designed to discover all relationships or traverse entire graphs suggesting reconnaissance, identifying queries searching for privilege escalation paths through organizational hierarchies or access relationships, recognizing unusual query volumes indicating data exfiltration, detecting queries from unexpected sources or during unusual hours, identifying queries accessing sensitive relationship data, recognizing pattern matching queries designed to discover specific relationship types, and detecting query patterns characteristic of attack tools. For example, detecting Cypher queries systematically traversing organizational hierarchy relationships from low-privilege users to administrative accounts indicates privilege escalation path discovery where attackers query graph database to identify relationship chains enabling lateral movement to privileged access.

A is incorrect because graph databases containing organizational relationships and access hierarchies are valuable targets for attackers planning privilege escalation and lateral movement. C is incorrect because graph database protocols create network traffic with query patterns observable through protocol analysis revealing suspicious database activities. D is incorrect because graph queries can indicate reconnaissance, attack path discovery, and data theft requiring security monitoring beyond assuming all queries are legitimate.

Organizations should monitor graph database queries for suspicious patterns, establish baselines for normal graph query activities, configure alerts for unusual queries particularly those traversing sensitive relationships or discovering privilege escalation paths, implement graph database access controls restricting query capabilities, and investigate detected query anomalies as potential reconnaissance or privilege escalation planning requiring response.

Question 168:

How does FortiNDR’s detection of unusual object storage API patterns enhance cloud data security?

A) Object storage APIs are only used by authorized applications

B) It identifies suspicious S3, Blob, or GCS API usage including unusual access patterns, bulk downloads, or permission modifications suggesting data theft or misconfiguration exploitation

C) Object storage traffic is indistinguishable from other cloud traffic

D) Cloud storage APIs cannot indicate security threats

Answer: B

Explanation:

FortiNDR identifies suspicious S3, Blob, or GCS API usage including unusual access patterns, bulk downloads, or permission modifications suggesting data theft or misconfiguration exploitation by monitoring object storage API traffic for behaviors revealing attacks targeting cloud storage for data exfiltration, reconnaissance, or configuration manipulation.

Object storage monitoring detects multiple threat patterns including detecting bulk object downloads suggesting data exfiltration, identifying unusual API access patterns from unexpected sources, recognizing permission modifications potentially exposing data publicly, detecting listing operations enumerating all stored objects for reconnaissance, identifying unusual deletion patterns suggesting destructive attacks, recognizing API usage from compromised credentials, and detecting access to sensitive objects outside normal patterns. For example, detecting thousands of S3 GetObject API calls from external IP address downloading all objects from buckets containing customer data indicates data theft where attackers use compromised credentials or exploit misconfigured permissions to systematically exfiltrate cloud-stored sensitive information.

A is incorrect because object storage APIs can be accessed by attackers using compromised credentials or exploiting misconfigurations requiring monitoring beyond assuming all access is authorized. C is incorrect because object storage traffic exhibits distinctive API patterns, data volumes, and access characteristics distinguishable from other cloud traffic. D is incorrect because cloud storage APIs specifically indicate various security threats including data theft, reconnaissance, and permission abuse.

Organizations should monitor object storage API usage for unusual patterns suggesting attacks, establish baselines for normal storage access patterns, configure alerts for bulk downloads or permission modifications, implement object storage security controls including access logging and encryption alongside monitoring, and investigate detected storage API anomalies as potential data theft requiring immediate credential rotation and access review.

Question 169:

What is the importance of detecting unusual DHCP behaviors in FortiNDR?

A) DHCP is purely operational and has no security implications

B) DHCP starvation attacks, rogue DHCP servers, or unusual lease patterns can indicate network attacks, man-in-the-middle positioning, or reconnaissance

C) DHCP traffic cannot reveal security threats

D) All DHCP activity is legitimate network operations

Answer: B

Explanation:

DHCP starvation attacks, rogue DHCP servers, or unusual lease patterns can indicate network attacks, man-in-the-middle positioning, or reconnaissance by monitoring DHCP traffic for anomalies revealing various attacks targeting network addressing and configuration for malicious purposes.

DHCP monitoring detects multiple threat patterns including identifying DHCP starvation attacks exhausting available IP addresses through excessive lease requests, detecting rogue DHCP servers providing malicious network configurations, recognizing DHCP spoofing positioning attackers as default gateways, identifying unusual DHCP discover patterns suggesting reconnaissance, detecting rapid DHCP lease cycling, recognizing DHCP options abuse including malicious DNS or gateway configurations, and identifying unusual DHCP relay behaviors. For example, detecting unauthorized system responding to DHCP requests offering itself as default gateway and DNS server indicates rogue DHCP server attack positioning attacker as man-in-the-middle intercepting all network traffic from systems accepting the malicious configuration.

A is incorrect because DHCP has significant security implications including network access, addressing, and configuration making it relevant for security monitoring. C is incorrect because DHCP traffic reveals various security threats through attack patterns, rogue servers, and unusual behaviors observable in protocol traffic. D is incorrect because DHCP activity can indicate attacks including starvation, rogue servers, and man-in-the-middle positioning requiring security monitoring.

Organizations should monitor DHCP traffic for attacks and rogue servers, implement DHCP snooping preventing unauthorized DHCP responses, configure alerts for unusual DHCP patterns including starvation or rogue server detection, establish baselines for normal DHCP activity, and investigate DHCP anomalies as potential network attacks or man-in-the-middle attempts requiring immediate response.

Question 170:

How does FortiNDR detect data exfiltration through abuse of legitimate backup software?

A) Backup software only performs authorized data protection

B) It identifies unusual backup patterns, unauthorized backup destinations, or suspicious backup operations suggesting data theft disguised as backup activities

C) Backup traffic cannot be monitored for security purposes

D) All backup operations are legitimate data protection

Answer: B

Explanation:

FortiNDR identifies unusual backup patterns, unauthorized backup destinations, or suspicious backup operations suggesting data theft disguised as backup activities by monitoring backup software communications and detecting behaviors revealing attackers or insiders abusing legitimate backup tools for data exfiltration.

Backup abuse detection identifies multiple exfiltration patterns including detecting backup operations to unauthorized destinations such as external storage or attacker infrastructure, identifying unusual backup schedules or ad-hoc backups outside normal backup windows, recognizing backup operations from unexpected systems or accounts, detecting selective backup of sensitive data inconsistent with normal backup policies, identifying unusual backup volumes exceeding normal patterns, recognizing backup operations immediately following sensitive data access, and detecting backup software usage from systems that shouldn’t perform backups. For example, detecting workstation using enterprise backup software to backup database server data directly to external cloud storage outside normal backup schedule indicates data exfiltration where attacker or malicious insider abuses legitimate backup tools and credentials to steal data through channel that blends with authorized backup activities.

A is incorrect because backup software can be abused for data exfiltration by attackers or malicious insiders despite legitimate purpose requiring security monitoring. C is incorrect because backup traffic exhibits patterns including destinations, schedules, volumes, and sources observable through network monitoring. D is incorrect because backup operations can indicate data theft when initiated by unauthorized users, to suspicious destinations, or with unusual patterns requiring investigation.

Organizations should monitor backup software usage for abuse patterns, establish baselines for authorized backup operations including schedules and destinations, configure alerts for backup activities outside normal patterns or to unauthorized destinations, implement backup software access controls restricting usage to authorized systems, and investigate detected backup anomalies as potential data exfiltration requiring immediate response.

Question 171:

What role does detection of unusual container registry access patterns play in FortiNDR cloud-native security?

A) Container registries are only accessed by authorized build systems

B) It identifies suspicious registry operations including unauthorized image pulls, malicious image pushes, or registry enumeration suggesting supply chain attacks or reconnaissance

C) Container registry traffic cannot reveal security threats

D) All registry access is legitimate DevOps activity

Answer: B

Explanation:

FortiNDR identifies suspicious registry operations including unauthorized image pulls, malicious image pushes, or registry enumeration suggesting supply chain attacks or reconnaissance by monitoring container registry API traffic for patterns revealing attacks targeting container infrastructure through image manipulation, unauthorized access, or reconnaissance of containerized applications.

Container registry monitoring detects multiple threat patterns including detecting unauthorized image pulls from production registries suggesting reconnaissance or intellectual property theft, identifying malicious image pushes potentially introducing backdoored containers into deployment pipelines, recognizing registry enumeration systematically listing all available images, detecting unusual registry access from unexpected sources or geographic locations, identifying image tag manipulation potentially enabling supply chain attacks, recognizing excessive image pull operations suggesting automated reconnaissance, and detecting registry credential abuse through unusual access patterns. For example, detecting external IP address systematically enumerating all images in private container registry then pulling proprietary application images indicates reconnaissance and intellectual property theft where attackers access registry to steal containerized applications and discover deployment architectures.

A is incorrect because container registries can be accessed by attackers using compromised credentials or exploiting misconfigurations requiring monitoring beyond assuming all access is authorized build activity. C is incorrect because container registry traffic exhibits distinctive API patterns revealing unauthorized access, malicious operations, and reconnaissance activities. D is incorrect because registry access can indicate attacks including supply chain manipulation, image theft, and reconnaissance requiring security monitoring.

Organizations should monitor container registry access for unusual patterns, implement strong authentication and access controls for registries, configure alerts for unauthorized registry operations or enumeration activities, establish baselines for legitimate registry usage patterns, and investigate detected registry anomalies as potential supply chain attacks or intellectual property theft requiring immediate credential rotation and image integrity verification.

Question 172:

How does FortiNDR’s detection of unusual Server Message Block (SMB) signing and encryption behaviors contribute to security?

A) SMB signing and encryption settings are irrelevant to security monitoring

B) It identifies SMB connections with disabled signing, encryption downgrade attempts, or unusual negotiation patterns suggesting man-in-the-middle attacks or exploitation

C) SMB security negotiation cannot be monitored

D) All SMB connections use maximum security settings

Answer: B

Explanation:

FortiNDR identifies SMB connections with disabled signing, encryption downgrade attempts, or unusual negotiation patterns suggesting man-in-the-middle attacks or exploitation by monitoring SMB protocol negotiation and detecting security feature downgrades or anomalies revealing attacks attempting to weaken SMB security for interception or exploitation.

SMB security monitoring detects multiple threat patterns including detecting SMB connections with signing disabled when policies require signing, identifying encryption downgrade attempts forcing unencrypted SMB sessions, recognizing unusual SMB dialect negotiation potentially indicating exploitation attempts, detecting connections deliberately avoiding SMB security features, identifying man-in-the-middle attempts observable through negotiation manipulation, recognizing relay attacks exploiting unsigned SMB sessions, and detecting unusual authentication mechanisms. For example, detecting SMB connections between domain member systems negotiating without signing despite domain policy requiring SMB signing indicates potential SMB relay attack where attacker intercepts and relays authentication to exploit unsigned sessions for unauthorized access.

A is incorrect because SMB signing and encryption settings have critical security implications with downgrades indicating potential attacks requiring monitoring. C is incorrect because SMB security negotiation occurs in protocol handshakes observable through network traffic analysis revealing security feature usage and downgrade attempts. D is incorrect because SMB connections can negotiate weaker security through downgrade attacks or misconfigurations making monitoring essential to detect security weaknesses.

Organizations should monitor SMB security negotiation for downgrade attempts and unsigned connections, implement and enforce SMB signing requirements through policies, configure alerts for SMB connections lacking required security features, require SMB encryption for sensitive file shares, and investigate detected SMB security anomalies as potential relay attacks or man-in-the-middle attempts requiring immediate response.

Question 173:

What is the significance of detecting unusual message queue protocol traffic in FortiNDR?

A) Message queue systems are never targeted by attackers

B) It identifies suspicious AMQP, MQTT, or Kafka traffic including unauthorized subscriptions, message injection, or unusual consumption patterns suggesting attacks on messaging infrastructure

C) Message queue traffic is indistinguishable from other application traffic

D) All message queue activity is legitimate application communication

Answer: B

Explanation:

FortiNDR identifies suspicious AMQP, MQTT, or Kafka traffic including unauthorized subscriptions, message injection, or unusual consumption patterns suggesting attacks on messaging infrastructure by monitoring message queue protocol traffic for behaviors revealing attacks targeting messaging systems for data theft, message manipulation, or infrastructure compromise.

Message queue monitoring detects multiple threat patterns including detecting unauthorized topic subscriptions enabling attackers to receive sensitive messages, identifying message injection attacks inserting malicious commands or data, recognizing unusual message consumption patterns suggesting data exfiltration, detecting unauthorized producers or consumers, identifying queue enumeration reconnaissance, recognizing unusual message volumes or patterns, and detecting credential abuse in messaging systems. For example, detecting unauthorized external connection subscribing to internal Kafka topics containing customer transaction data indicates data exfiltration where attacker gains access to message broker consuming real-time sensitive business data flowing through messaging infrastructure.

A is incorrect because message queue systems containing sensitive data and controlling application workflows are valuable attack targets requiring security monitoring. C is incorrect because message queue traffic exhibits distinctive protocol patterns, subscription behaviors, and message characteristics distinguishable from other application traffic. D is incorrect because message queue activity can indicate attacks including unauthorized subscriptions, message injection, and data theft requiring monitoring.

Organizations should monitor message queue protocol traffic for unusual patterns, implement authentication and authorization for messaging systems, configure alerts for unauthorized subscriptions or unusual message patterns, establish baselines for legitimate message queue usage, and investigate detected messaging anomalies as potential data theft or message manipulation requiring immediate access review and credential rotation.

Question 174:

How does FortiNDR detect exploitation of misconfigured CORS policies through unusual cross-origin request patterns?

A) CORS is a browser security feature unrelated to network monitoring

B) It identifies suspicious cross-origin requests, unusual preflight patterns, or exploitation of overly permissive CORS configurations suggesting web application attacks

C) Cross-origin requests cannot be analyzed through network traffic

D) All CORS requests are legitimate cross-domain integrations

Answer: B

Explanation:

FortiNDR identifies suspicious cross-origin requests, unusual preflight patterns, or exploitation of overly permissive CORS configurations suggesting web application attacks by monitoring HTTP traffic for CORS-related headers and patterns revealing attacks exploiting weak CORS policies for unauthorized data access or credential theft.

CORS exploitation monitoring detects multiple attack patterns including detecting cross-origin requests from suspicious or unexpected origins, identifying unusual CORS preflight request patterns, recognizing exploitation of wildcard CORS policies allowing any origin, detecting credential-bearing cross-origin requests to sensitive APIs, identifying CORS requests from newly registered or suspicious domains, recognizing unusual volumes of cross-origin requests suggesting automated exploitation, and detecting CORS policy violations indicating misconfiguration testing. For example, detecting numerous cross-origin API requests with credentials from external attacker-controlled domain to internal web application with misconfigured wildcard CORS policy indicates exploitation where attacker leverages overly permissive CORS configuration to steal user data or perform unauthorized actions through victim browsers.

A is incorrect because while CORS is primarily browser-enforced, CORS exploitation creates observable network traffic patterns revealing attacks against web applications. C is incorrect because cross-origin requests include distinctive HTTP headers and patterns observable through network traffic analysis. D is incorrect because CORS requests can indicate exploitation of misconfigurations or attacks targeting web applications requiring security monitoring.

Organizations should monitor for unusual cross-origin request patterns, implement strict CORS policies avoiding wildcard configurations, configure alerts for suspicious cross-origin activities particularly from unexpected origins, regularly audit CORS configurations for security weaknesses, and investigate detected CORS anomalies as potential web application exploitation requiring policy tightening and security review.

Question 175:

What role does monitoring for unusual gRPC or protocol buffer traffic play in FortiNDR?

A) gRPC traffic is always legitimate microservices communication

B) It identifies suspicious gRPC patterns including unauthorized service access, unusual method invocations, or excessive requests suggesting API abuse or reconnaissance

C) Protocol buffer traffic cannot be analyzed for security

D) Microservices communication requires no security monitoring

Answer: B

Explanation:

FortiNDR identifies suspicious gRPC patterns including unauthorized service access, unusual method invocations, or excessive requests suggesting API abuse or reconnaissance by monitoring gRPC protocol traffic for behaviors revealing attacks targeting microservices architectures through API abuse, unauthorized access, or service enumeration.

gRPC monitoring detects multiple threat patterns including detecting gRPC requests from unexpected sources accessing internal microservices, identifying unusual method invocations inconsistent with normal service usage, recognizing excessive gRPC requests suggesting denial of service or reconnaissance, detecting unauthorized gRPC service enumeration, identifying unusual error patterns suggesting exploitation attempts, recognizing gRPC stream abuse for data exfiltration, and detecting credential abuse in gRPC authentication. For example, detecting external source making thousands of gRPC requests invoking administrative service methods on internal microservices indicates API abuse where attacker gains unauthorized access to gRPC endpoints exploiting misconfigurations or compromised credentials to control microservices infrastructure.

A is incorrect because gRPC traffic can indicate unauthorized access, API abuse, and attacks targeting microservices requiring security monitoring. C is incorrect because protocol buffer traffic exhibits patterns including service calls, methods, and volumes observable through network traffic analysis. D is incorrect because microservices communication specifically requires monitoring to detect unauthorized access, API abuse, and service-to-service attack patterns.

Organizations should monitor gRPC traffic for unusual patterns suggesting attacks, implement strong authentication and authorization for gRPC services, configure alerts for unexpected gRPC access or unusual method invocations, establish baselines for legitimate gRPC usage patterns, and investigate detected gRPC anomalies as potential microservices attacks requiring immediate access review and credential rotation.

Question 176:

How does FortiNDR’s detection of unusual blockchain or cryptocurrency node communications contribute to security?

A) Blockchain traffic is always legitimate cryptocurrency operations

B) It identifies unauthorized cryptocurrency nodes, mining pool connections, or blockchain protocol abuse suggesting cryptojacking, illicit transactions, or policy violations

C) Blockchain protocols cannot indicate security threats

D) Cryptocurrency activity is outside network security scope

Answer: B

Explanation:

FortiNDR identifies unauthorized cryptocurrency nodes, mining pool connections, or blockchain protocol abuse suggesting cryptojacking, illicit transactions, or policy violations by monitoring blockchain protocol traffic for activities revealing unauthorized cryptocurrency operations, mining malware, or policy-violating blockchain usage.

Blockchain monitoring detects multiple threat patterns including detecting connections to cryptocurrency mining pools indicating cryptojacking malware, identifying unauthorized blockchain full nodes consuming network bandwidth, recognizing cryptocurrency wallet synchronization from unexpected systems, detecting blockchain protocol traffic violating acceptable use policies, identifying unusual volumes of blockchain transactions, recognizing connections to privacy-focused cryptocurrency networks potentially used for illicit purposes, and detecting blockchain oracle or smart contract interactions from compromised systems. For example, detecting workstations establishing persistent connections to Monero mining pools with continuous high-volume bidirectional traffic indicates cryptojacking where mining malware hijacks system resources to generate cryptocurrency for attackers while degrading performance and consuming electricity.

A is incorrect because blockchain traffic can indicate cryptojacking malware, policy violations, and unauthorized cryptocurrency operations requiring security monitoring. C is incorrect because blockchain protocols exhibit distinctive patterns revealing mining activities, node operations, and transactions observable through network analysis. D is incorrect because cryptocurrency activity has security implications including malware infections, policy violations, and resource theft making it relevant for network security monitoring.

Organizations should monitor for unauthorized blockchain and cryptocurrency traffic, implement policies governing acceptable cryptocurrency usage and detect violations, configure alerts for mining pool connections or unexpected blockchain activity, recognize that cryptojacking represents both malware infection and resource theft, and investigate detected blockchain anomalies requiring malware remediation or policy enforcement.

Question 177:

What is the importance of detecting unusual service mesh control plane communications in FortiNDR?

A) Service mesh traffic is purely operational infrastructure

B) It identifies suspicious Istio, Linkerd, or Consul control plane access suggesting configuration manipulation, service discovery abuse, or mesh infrastructure compromise

C) Service mesh cannot be exploited through network attacks

D) Control plane traffic provides no security indicators

Answer: B

Explanation:

FortiNDR identifies suspicious Istio, Linkerd, or Consul control plane access suggesting configuration manipulation, service discovery abuse, or mesh infrastructure compromise by monitoring service mesh control plane communications for patterns revealing attacks targeting mesh infrastructure for configuration changes, service enumeration, or traffic manipulation.

Service mesh monitoring detects multiple threat patterns including detecting unauthorized access to control plane APIs enabling configuration manipulation, identifying service discovery enumeration revealing microservices architecture, recognizing unusual control plane configuration changes potentially introducing routing manipulations, detecting unauthorized certificate requests from mesh certificate authorities, identifying unusual sidecar proxy communications, recognizing control plane credential abuse, and detecting mesh telemetry exfiltration revealing application architectures and data flows. For example, detecting unauthorized external access to Istio control plane modifying routing rules to redirect application traffic through attacker-controlled proxies indicates mesh compromise enabling man-in-the-middle attacks and data exfiltration through service mesh infrastructure manipulation.

A is incorrect because service mesh control plane communications have security implications with unauthorized access enabling infrastructure manipulation and service compromise. C is incorrect because service mesh can be exploited through control plane access, configuration manipulation, and certificate authority compromise. D is incorrect because control plane traffic provides valuable security indicators revealing unauthorized access, configuration changes, and infrastructure compromise.

Organizations should monitor service mesh control plane communications for unauthorized access, implement strong authentication for mesh infrastructure, configure alerts for unusual control plane activities or configuration changes, establish baselines for legitimate mesh operations, and investigate detected mesh anomalies as potential infrastructure compromise requiring immediate credential rotation and configuration review.

Question 178:

How does FortiNDR detect data exfiltration through abuse of legitimate source code repositories?

A) Source code repository usage is always authorized development activity

B) It identifies unusual repository operations including excessive clones, suspicious commits, or unauthorized repository access suggesting intellectual property theft

C) Git traffic cannot reveal security threats

D) Repository access patterns provide no security value

Answer: B

Explanation:

FortiNDR identifies unusual repository operations including excessive clones, suspicious commits, or unauthorized repository access suggesting intellectual property theft by monitoring source code repository traffic for behaviors revealing attackers or insiders exfiltrating proprietary code, injecting malicious code, or conducting reconnaissance through repository access.

Repository monitoring detects multiple threat patterns including detecting unusual repository cloning from unexpected sources or locations, identifying excessive repository access or bulk downloads suggesting code theft, recognizing unauthorized commits potentially injecting malicious code, detecting repository enumeration revealing project structures, identifying unusual Git operations during off-hours, recognizing large blob uploads potentially exfiltrating data disguised as code, and detecting credential abuse accessing repositories. For example, detecting developer account cloning all organizational repositories including proprietary product codebases to external personal GitHub account during final week before resignation indicates intellectual property theft where insider exfiltrates valuable source code for use at competitor or personal gain.

A is incorrect because source code repository access can indicate intellectual property theft, malicious code injection, or unauthorized access requiring security monitoring. C is incorrect because Git and other repository protocols exhibit patterns including operations, volumes, and accessed repositories observable through network traffic analysis. D is incorrect because repository access patterns provide security value revealing code theft, unauthorized access, and suspicious repository operations.

Organizations should monitor source code repository access for unusual patterns, implement strong authentication and access controls for repositories, configure alerts for bulk cloning or unusual repository operations, establish baselines for normal repository usage including accessed projects and operation types, and investigate detected repository anomalies as potential intellectual property theft requiring immediate access review and credential rotation.

Question 179:

What role does detection of unusual Internet of Things (IoT) protocol traffic patterns play in FortiNDR?

A) IoT protocols are too diverse to monitor effectively

B) It identifies suspicious Zigbee, Z-Wave, LoRaWAN, or proprietary IoT protocol behaviors suggesting device compromise, unauthorized control, or reconnaissance

C) IoT protocols cannot be analyzed through network monitoring

D) All IoT traffic is legitimate device communication

Answer: B

Explanation:

FortiNDR identifies suspicious Zigbee, Z-Wave, LoRaWAN, or proprietary IoT protocol behaviors suggesting device compromise, unauthorized control, or reconnaissance by monitoring IoT protocol traffic for patterns revealing attacks targeting IoT devices for botnet recruitment, unauthorized control, or network pivoting.

IoT protocol monitoring detects multiple threat patterns including detecting unusual IoT device communications suggesting compromise or unauthorized control, identifying IoT protocol scanning indicating reconnaissance, recognizing abnormal sensor data patterns potentially indicating manipulation, detecting unauthorized pairing or joining to IoT networks, identifying command injection through IoT protocols, recognizing firmware update anomalies, and detecting IoT devices communicating with unexpected external destinations. For example, detecting building automation IoT devices using LoRaWAN protocol suddenly communicating with external command servers combined with network scanning behavior indicates IoT compromise where attackers exploit vulnerable building systems for botnet recruitment and network reconnaissance.

A is incorrect because despite IoT protocol diversity, common IoT protocols and behavioral patterns can be monitored effectively for security threats. C is incorrect because IoT protocols create network traffic with observable patterns revealing device behaviors, communications, and anomalies. D is incorrect because IoT traffic can indicate device compromise, botnet participation, and unauthorized control requiring security monitoring.

Organizations should monitor IoT protocol traffic for unusual patterns suggesting compromise, segment IoT devices from critical networks limiting attack impact, implement IoT device inventory and baseline normal behaviors, configure alerts for suspicious IoT activities including unexpected external communications, and investigate detected IoT anomalies as potential device compromise requiring isolation and firmware verification.

Question 180:

How does FortiNDR’s detection of unusual database connection pooling behaviors enhance security?

A) Connection pooling is purely a performance optimization

B) It identifies suspicious connection pool abuse, unusual pool exhaustion patterns, or connection hijacking suggesting application-layer attacks or resource exhaustion

C) Connection pool traffic cannot reveal security threats

D) All connection pool activity is legitimate application behavior

Answer: B

Explanation:

FortiNDR identifies suspicious connection pool abuse, unusual pool exhaustion patterns, or connection hijacking suggesting application-layer attacks or resource exhaustion by monitoring database connection pool behaviors and detecting anomalies revealing attacks exploiting connection management for denial of service, unauthorized access, or application compromise.

Connection pool monitoring detects multiple threat patterns including detecting connection pool exhaustion attacks preventing legitimate application access, identifying unusual connection pool usage patterns suggesting application exploitation, recognizing connection hijacking where attackers reuse pooled connections, detecting abnormal connection lifetimes indicating resource leaks or attacks, identifying unusual connection pool sizes or configurations, recognizing connection pool credential abuse, and detecting application-layer denial of service through connection exhaustion. For example, detecting sudden connection pool exhaustion where all available database connections are consumed and held open preventing legitimate application access indicates denial of service attack exploiting application connection management to disrupt database access and application functionality.

A is incorrect because connection pooling has security implications beyond performance with abuse enabling attacks and unusual patterns indicating application compromise. C is incorrect because connection pool traffic exhibits patterns including pool utilization, connection lifetimes, and usage behaviors observable through network monitoring. D is incorrect because connection pool activity can indicate attacks including exhaustion, hijacking, and application exploitation requiring security monitoring.

Organizations should monitor database connection pool behaviors for unusual patterns, implement connection pool limits and timeouts preventing exhaustion attacks, configure alerts for pool exhaustion or unusual usage patterns, establish baselines for normal connection pool utilization, and investigate detected connection pool anomalies as potential application attacks requiring immediate application review and potential restart.