Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam NSE7_PBC-7.2 Topic 1 Question 1 Discussion

Actual exam question for Fortinet's NSE7_PBC-7.2 exam
Question #: 1
Topic #: 1
[All NSE7_PBC-7.2 Questions]

You are deploying Amazon Web Services (AWS) GuardDuty to monitor malicious or unauthorized behaviors related to AWS resources. You will also use the Fortinet aws-lambda-guardduty script to translate feeds from AWS GuardDuty findings into a list of malicious IP addresses. FortiGate can then consume this list as an external threat feed.

Which Amazon AWS services must you subscribe to in order to use this feature?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

Lynna
8 days ago
Good point! I was just thinking the same thing. Maybe we'd need to set up some S3 buckets or CloudWatch logs to capture the GuardDuty findings and then have the Fortinet script access that data. This seems like it could get a bit complex, but the end result of integrating with FortiGate is pretty useful.
upvoted 0 times
...
Mila
9 days ago
Ah, I see. So we'd need to have both GuardDuty and Lambda enabled in our AWS environment to make this work. I wonder if there are any other services we might need to consider, like AWS CloudWatch or AWS S3 to handle the data flow?
upvoted 0 times
...
Peter
10 days ago
Yeah, I agree. The key services I can think of are AWS GuardDuty and AWS Lambda. GuardDuty is responsible for detecting the malicious or unauthorized behaviors, and the Fortinet script you mentioned is a Lambda function that translates those findings into a threat feed for FortiGate.
upvoted 0 times
...
Melodie
11 days ago
Hmm, this is a tricky one. I think we need to have a good understanding of the AWS services involved in this setup. From the question, it seems like we need to subscribe to AWS GuardDuty and possibly some other services to make this work.
upvoted 0 times
...

Save Cancel