Which two products integrated with FortiSandbox work to protect against the lateral movement stage of the Cyber Kill Chain? (Choose two answers)
You determine that there are a large number of samples on FortiSandbox that are obsolete and no longer needed for future analysis. Which CLI tool must you use to remediate this issue? (Choose one answer)
A FortiSandbox VM has been deployed and has been functioning correctly for several months. Suddenly, the system begins rejecting file submissions with an error message indicating a licensing problem. How can you determine, using the CLI, if the license is still valid? (Choose one answer)
Refer to the exhibit.

Which two inspections will FortiSandbox perform on samples submitted for sandboxing? (Choose two answers)
Refer to the exhibits.

You are unable to download guest VMs on a new FortiSandbox VM. What is the reason for this? (Choose one answer)
A security analyst is reviewing a scan job report that indicates a true positive match. The job report displays that the malware attempts to replace vital system executables. Which type of malware is the analyst observing? (Choose one answer)
To assign a file to a VM image, which two conditions must be true? (Choose two answers)
To allow access to the FortiSandbox GUI the administrator must configure an IP address and a default gateway. Which two commands must the administrator use to accomplish this task? (Choose two answers)
A FortiGate root VDOM is authorized on FortiSandbox, and FortiGate is configured to send suspicious files to FortiSandbox for inspection. You create a new VDOM and then generates some traffic so that the new VDOM sends a file to FortiSandbox for the first time. In this scenario, which action will FortiSandbox take? (Choose one answer)
An organization has an existing FortiGate provisioned as a data center firewall (DCFW) that submits inbound files to FortiSandbox for inline scanning. As a result of a network redesign, traffic between the FortiSandbox and the DCFW now passes through an intermediate firewall. Inline scanning is no longer working. While examining the configuration of the intermediate firewall you notice that it is configured to allow traffic on ports TCP/3389, UDP/53, and TCP/443. What must you change for the integration to work? (Choose one answer)