Home Fortinet Sandbox Quiz Answer NSE 2 Information Security Awareness Fortinet

Sandbox Quiz Answer NSE 2 Information Security Awareness Fortinet

0
860

Question 1: Which two problems was network security experiencing before the introduction of a sandbox solution? (Choose two.)

  • Network security was unable to handle a coordinated attack using different threat vectors and methods.
  • AVs were not introduced into network security.
  • Security devices did not communicate with other security devices on the network.
  • Firewalls were non-existent.

Question 2: For which two reasons was the sandbox solution added to network security? (Choose two.)

  • Firewalls were quite sufficient but better risk management was needed.
  • Firewalls and AVs were helpless against unknown threats.
  • Unknown threats needed to be quarantined.
  • AVs were able to stop unknown threats, but firewalls could not.

Question 3: How does sandbox solve the problem of aggregating threat intelligence data?

  • By sharing malicious code with all devices on the network
  • By sharing valuable threat intelligence to the security devices on its network
  • By alerting administrators to threats
  • By executing malicious code in multiple isolated environments

Question 4: What are two characteristics of a sandbox? (Choose two.)

  • A sandbox only provides completely independent protection of IOT devices.
  • If something unexpected or malicious happens, it affects only the sandbox.
  • A sandbox provides full network security.
  • A sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network.

Question 5: Which two business problems is FortiSandbox trying to solve? (Choose two.)

  • Nonexistent or inadequate firewall protection
  • Insufficient fine-tuning of network performance
  • The choice of performance over security by businesses
  • The potential to exploit OS or application weaknesses with malignant code

Question 6: What is the purpose of the sandbox?

  • To stop all BYOD network traffic
  • To flag and pass the known exploit to the endpoint to handle
  • To observe the activity of unknown code in a quarantined environment
  • To run vulnerability scans on all network endpoints

Question 7: What is a zero-day attack?

  • Exploiting a vulnerability scanner
  • Vulnerability scanning from the zero-day
  • Exploiting only zero-day configured firewalls.
  • Exploiting an unknown deficiency in code.

Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning?
Select one:

  • AI-driven attacks*
  • Trojan horse
  • Ransomware
  • Polymorphic viruses

Which feature in early networks made aggregating threat intelligence difficult?
Select one:

  • Hybrid cloud environments
  • Virtualization
  • Segmentation
  • Point solutions

Which failing characterized early sandbox technology?
Select one:

  • Could not stop zero-day attacks/
  • Failed to categorize malware/
  • Lack of integration with other security devices
  • Slowed network traffic

Within the computer security context, what is a sandbox?
Select one:

  • An isolated virtual environment to test suspicious files and hyperlinks*
  • A process used to identify, describe, and categorize malware
  • A service in the Cloud used to collect and share threat intelligence
  • A segment of the network reserved for testing unknown programs

Which feature characterizes third-generation sandbox technology?
Select one:

  • Scanning of encrypted data streams
  • Streamlines manual testing
  • Automation and artificial intelligence
  • Faster network speeds

What was a benefit of second generation sandbox technology?
Select one:

  • Scanning of encrypted data streams
  • Automation and artificial intelligence (AI)
  • Faster network speeds
  • Timely sharing of threat intelligence

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Please Comment for your required Exam Answers and we will try to provide you at shortest time. We truly value your contribution to the website. Thank you!!!