New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet NSE7_CDS_AR-7.6 Exam - Topic 3 Question 2 Discussion

Actual exam question for Fortinet's NSE7_CDS_AR-7.6 exam
Question #: 2
Topic #: 3
[All NSE7_CDS_AR-7.6 Questions]

Refer to the exhibit.

A FortiCNAPP administrator used the FortiCNAPP Explorer to reveal all hosts exposed to the internet that are running active packages with vulnerabilities of all severity levels. Why do only the first two results have an attack path? (Choose one answer)

Show Suggested Answer Hide Answer
Suggested Answer: A

Comprehensive and Detailed Explanation From FortiOS 7.6, FortiWeb 7.4 Exact Extract study guide:

Based on the FortiCNAPP (formerly Lacework) Cloud Security documentation regarding Attack Path Analysis and Explorer functionality:

Attack Path Generation (Option A): In FortiCNAPP, an 'Attack Path' is a visualized sequence of potential exploit steps that an external attacker could take to reach a sensitive resource. For the platform to generate and display an attack path, the target resource must be externally reachable.

Evidence in the Exhibit: * The exhibit shows a list of EC2 and GCP instances.

The first two results (Resource IDs i-0d2d... and i-0e29...) have values populated in the Public IP Addresses column (44.197.... and 3.226....). Consequently, these are the only two resources showing a value of 1 in the Attack Paths column.

The remaining resources in the list do not have public IP addresses listed in the exhibit's view, and as a result, their Attack Paths count is 0. This confirms that FortiCNAPP specifically calculates these paths for resources that have a direct entry point from the internet via a public IP.

Contextual Risk Assessment: FortiCNAPP prioritizes attack path analysis for internet-exposed assets because they represent the highest immediate risk. While internal resources may have vulnerabilities, the lack of a public-facing network interface means there is no direct external 'path' to visualize in this specific Explorer view.


Contribute your Thoughts:

0/2000 characters
Barbra
5 days ago
I remember practicing a question about attack paths and how they relate to vulnerability severity, but I can't recall if high impact scores were specifically mentioned.
upvoted 0 times
...
Ariel
10 days ago
I think the attack paths might be related to the public IP addresses, but I'm not entirely sure if that's the only factor.
upvoted 0 times
...
Von
15 days ago
I'm not entirely sure about this one. I'll need to review the information in the exhibit and think through the different options carefully. The concept of "attack path" is a bit unfamiliar to me, so I'll need to make sure I understand that before I can confidently choose an answer.
upvoted 0 times
...
Kenneth
20 days ago
I think the key is to look at the severity of the vulnerabilities. Option D mentions "critical vulnerabilities", so that might be the reason why only the first two results have an attack path. The other resources might have less severe vulnerabilities.
upvoted 0 times
...
Kyoko
25 days ago
Hmm, I'm leaning towards option C. It seems like the attack path might only be available for resources with potential multi-hop exposure, meaning they could be accessed through multiple steps. But I'm not totally sure about that.
upvoted 0 times
...
Lashawnda
1 month ago
I'm a bit confused by the concept of "attack path". I'm not sure what that means in the context of this question. I'll need to think about it more to try to figure out the right answer.
upvoted 0 times
...
Gracie
1 month ago
I think the key here is to focus on the concept of "attack path". The question is asking why only the first two results have an attack path, so we need to understand what that means and how it relates to the different options.
upvoted 0 times
...

Save Cancel