What detection pattern indicates a real breach in compromised hosts?

Study for the Fortinet FortiAnalyzer 6.4 Test. Use interactive flashcards and multiple choice questions with detailed explanations. Be exam-ready!

The detection pattern that indicates a real breach in compromised hosts is "Infected." This designation is used to highlight that a host has been compromised by malware or an external threat, showcasing an actual breach where security measures have failed and the system's integrity is compromised.

When a system is marked as "Infected," it typically means that malicious activity has been detected, which could include the presence of viruses, worms, or other types of malware that have been installed on the host without authorization. This classification serves as a critical alert for security teams, prompting immediate action to mitigate the threat and remediate the affected system.

In contrast, the other detection patterns imply different states of security. "Highly suspicious" may indicate potentially risky behavior that could lead to a compromise but does not confirm actual compromise. "Safe" clearly indicates that no threats are present, and "Secure" implies that the system has robust defenses in place. These categories do not reflect an active breach, making "Infected" the unmistakable choice for a confirmed compromise.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy