Sie sind auf Seite 1von 2

23/4/2020 Sandbox Quiz

 The Evolution of Cybersecurity

Started on Thursday, April 23, 2020, 8:02 AM


State Finished
Completed on Thursday, April 23, 2020, 8:06 AM
Time taken 3 mins 5 secs
Points 4/5
Grade 80 out of 100
Feedback Congratulations, you passed!

Question 1 What are two characteristics of a sandbox? (Choose two.)


Incorrect

0 points out of 1 Select one or more:


If something unexpected or malicious happens, it affects only the sandbox. 

A sandbox only provides completely independent protection of IOT devices.

A sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network.

A sandbox provides full network security. 

Question 2 What is a zero-day attack?


Correct

1 points out of 1 Select one:


Exploiting a vulnerability scanner

Exploiting an unknown deficiency in code. 

Exploiting only zero-day configured firewalls.

Vulnerability scanning from the zero-day

Question 3 For which two reasons was the sandbox solution added to network security? (Choose two.)
Correct

1 points out of 1 Select one or more:


AVs were able to stop unknown threats, but firewalls could not.

Firewalls and AVs were helpless against unknown threats. 

Firewalls were quite sufficient but better risk management was needed.

Unknown threats needed to be quarantined. 

Question 4 How does sandbox solve the problem of aggregating threat intelligence data?
Correct

1 points out of 1 Select one:


By executing malicious code in multiple isolated environments

By sharing malicious code with all devices on the network

By alerting administrators to threats

By sharing valuable threat intelligence to the security devices on its network 

https://training.fortinet.com/mod/quiz/review.php?attempt=3148729&cmid=53693 1/2
23/4/2020 Sandbox Quiz

Question 5 Which two problems was network security experiencing before the introduction of a sandbox solution? (Choose two.)
Correct

1 points out of 1 Select one or more:


Security devices did not communicate with other security devices on the network. 

Firewalls were non-existent.

Network security was unable to handle a coordinated attack using different threat vectors and methods. 

AVs were not introduced into network security.

https://training.fortinet.com/mod/quiz/review.php?attempt=3148729&cmid=53693 2/2

Das könnte Ihnen auch gefallen