A. Allows the infected file to download without scan
B. Blocks the infected files as it is downloading
C. Sends the infected file to FortiGuard for analysis
D. Quarantines the infected files and logs all access attempts
A. Real-time protection must update the signature database from FortiSandbox
B. Real-time protection sends malicious files to FortiSandbox when the file is not detected locally
C. Real-time protection is disabled
D. Real-time protection must update AV signature database
A. It scans executable files. DLLs, and drivers that are currently running, for threats.
B. It allows users to select a specific file folder on their local hard disk drive (HDD), to scan for threats.
C. It scans programs and drivers that are currently running, for threats
D. It performs a full system scan including all files, executable files. DLLs, and drivers for throats.
A. It provides centralized management of FortiGate devices.
B. It provides centralized management of FortiClient Android endpoints only.
C. It provides centralized management of Chromebooks running real-time protection
D. lt provides centralized management of multiple endpoints running FortiClient software.
A. Internet Explorer
B. Twitter
C. Firefox
D. Facebook
A. FortiAnalyzer
B. FortiClient EMS
C. FortiGate
D. FortiClient