Sie sind auf Seite 1von 2

Sandbox

-------
In this lesson, you will learn about a security technology that can detect threats
that have never been detected before.

Question 1
Which two business problems is FortiSandbox trying to solve? (Choose two.)
Select one or more:
Insufficient fine-tuning of network performance
Nonexistent or inadequate firewall protection
The potential to exploit OS or application weaknesses with malignant code [CORRECT
ANSWER]
The choice of performance over security by businesses [CORRECT ANSWER]

Question 2
What is the purpose of the sandbox?
Select one:
To observe the activity of unknown code in a quarantined environment [CORRECT
ANSWER]
To flag and pass the known exploit to the endpoint to handle
To run vulnerability scans on all network endpoints
To stop all BYOD network traffic

Question 3
What is a zero-day attack?
Select one:
Exploiting an unknown deficiency in code. [CORRECT ANSWER]
Exploiting only zero-day configured firewalls.
Exploiting a vulnerability scanner
Vulnerability scanning from the zero-day

Question 4
For which two reasons was the sandbox solution added to network security? (Choose
two.)
Select one or more:
Firewalls and AVs were helpless against unknown threats. [CORRECT ANSWER]
Unknown threats needed to be quarantined. [CORRECT ANSWER]
Firewalls were quite sufficient but better risk management was needed.
AVs were able to stop unknown threats, but firewalls could not.

Question 5
Which two problems was network security experiencing before the introduction of a
sandbox solution? (Choose two.)
Select one or more:
AVs were not introduced into network security.
Firewalls were non-existent.
Security devices did not communicate with other security devices on the network.
[CORRECT ANSWER]
Network security was unable to handle a coordinated attack using different threat
vectors and methods. [CORRECT ANSWER]

ATTEMPT #2

Question 3
What are two characteristics of a sandbox? (Choose two.)
Select one or more:
If something unexpected or malicious happens, it affects only the sandbox.
[CORRECT ANSWER]
A sandbox confines the actions of code to the sandbox device and in isolation to
the rest of the network. [CORRECT ANSWER]
A sandbox provides full network security.
A sandbox only provides completely independent protection of IOT devices.

Question 5
How does sandbox solve the problem of aggregating threat intelligence data?
Select one:
By alerting administrators to threats
By sharing malicious code with all devices on the network
By executing malicious code in multiple isolated environments
By sharing valuable threat intelligence to the security devices on its network
[CORRECT ANSWER]

Das könnte Ihnen auch gefallen