NSE5_EDR-5.0試験無料問題集「Fortinet NSE 5 - FortiEDR 5.0 認定」

Which two types of remote authentication does the FortiEDR management console support? (Choose two.)

What is the benefit of using file hash along with the file name in a threat hunting repository search?

Refer to the exhibit.

Based on the event shown in the exhibit, which two statements about the event are true? (Choose two.)