Вы находитесь на странице: 1из 4

The Evolution of Cybersecurity

Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>


Started on Saturday, May 9, 2020, 8:35 AM
State Finished
Completed on Saturday, May 9, 2020, 8:41 AM
Time taken 5 mins 50 secs
Points 5/5
Grade 100 out of 100
Feedback Congratulations, you passed!

Question 1

Correct
1 points out of 1

Flag question

Question text

Which two problems was network security experiencing before the introduction of a
sandbox solution? (Choose two.)
Select one or more:
Security devices did not communicate with other security devices on the network.

Network security was unable to handle a coordinated attack using different threat

vectors and methods.


Firewalls were non-existent.

AVs were not introduced into network security.

Question 2

Correct
1 points out of 1

Flag question

Question text

What is the purpose of the sandbox?


Select one:
To stop all BYOD network traffic

To observe the activity of unknown code in a quarantined environment

To flag and pass the known exploit to the endpoint to handle

To run vulnerability scans on all network endpoints

Question 3

Correct
1 points out of 1

Flag question

Question text

What are two characteristics of a sandbox? (Choose two.)


Select one or more:
If something unexpected or malicious happens, it affects only the sandbox.

A sandbox provides full network security.


A sandbox confines the actions of code to the sandbox device and in isolation to the

rest of the network.


A sandbox only provides completely independent protection of IOT devices.

Question 4

Correct
1 points out of 1

Flag question

Question text

Which two business problems is FortiSandbox trying to solve? (Choose two.)


Select one or more:
The choice of performance over security by businesses

Insufficient fine-tuning of network performance

The potential to exploit OS or application weaknesses with malignant code

Nonexistent or inadequate firewall protection

Question 5

Correct
1 points out of 1

Flag question
Question text

For which two reasons was the sandbox solution added to network security? (Choose two.)
Select one or more:
Unknown threats needed to be quarantined.

AVs were able to stop unknown threats, but firewalls could not.

Firewalls were quite sufficient but better risk management was needed.

Firewalls and AVs were helpless against unknown threats.

Вам также может понравиться