Sandbox Quiz Answer NSE 2
Fig 1: Sandbox Quiz Answer NSE 2 |
Question 1: Which two problems was network security experiencing
before the introduction of a sandbox solution? (Choose two.)
·
Network security was unable to handle a
coordinated attack using different threat vectors and methods.
·
AVs were not introduced into network security.
·
Security devices did not communicate with
other security devices on the network.
·
Firewalls were non-existent.
Question 2: For which two reasons was the sandbox solution added
to network security? (Choose two.)
·
Firewalls were quite sufficient but better risk management was
needed.
·
Firewalls and AVs were helpless against
unknown threats.
·
Unknown threats needed to be quarantined.
·
AVs were able to stop unknown threats, but firewalls could not.
Question 3: How does sandbox solve the problem of aggregating
threat intelligence data?
·
By sharing malicious code with all devices on the network
·
By sharing valuable threat intelligence to the
security devices on its network
·
By alerting administrators to threats
·
By executing malicious code in multiple isolated environments
Question 4: What are two characteristics of a sandbox? (Choose
two.)
·
A sandbox only provides completely independent protection of IOT
devices.
·
If something unexpected or malicious happens,
it affects only the sandbox.
·
A sandbox provides full network security.
·
A sandbox confines the actions of code to the
sandbox device and in isolation to the rest of the network.
Question 5: Which two business problems is FortiSandbox trying
to solve? (Choose two.)
·
Nonexistent or inadequate firewall protection
·
Insufficient fine-tuning of network performance
·
The choice of performance over security by
businesses
·
The potential to exploit OS or application
weaknesses with malignant code
Question 6: What is the purpose of the sandbox?
·
To stop all BYOD network traffic
·
To flag and pass the known exploit to the endpoint to handle
·
To observe the activity of unknown code in a
quarantined environment
·
To run vulnerability scans on all network endpoints
Question 7: What is a zero-day attack?
·
Exploiting a vulnerability scanner
·
Vulnerability scanning from the zero-day
·
Exploiting only zero-day configured firewalls.
·
Exploiting an unknown deficiency in code.
Question 8: Which new development in malware caused sandbox technology
to automate and introduce artificial intelligence learning?
Select one:
·
AI-driven attacks*
·
Trojan horse
·
Ransomware
·
Polymorphic viruses
Question 9: Which feature in early networks made aggregating
threat intelligence difficult?
Select one:
·
Hybrid cloud environments
·
Virtualization
·
Segmentation
·
Point solutions
Question 10: Which failing characterized early sandbox
technology?
Select one:
·
Could not stop zero-day attacks/
·
Failed to categorize malware/
·
Lack of integration with other security
devices
·
Slowed network traffic
Question 11: Within the computer security context, what is a
sandbox?
Select one:
·
An isolated virtual environment to test
suspicious files and hyperlinks*
·
A process used to identify, describe, and categorize malware
·
A service in the Cloud used to collect and share threat
intelligence
·
A segment of the network reserved for testing unknown programs
Question 12: Which feature characterizes third-generation
sandbox technology?
Select one:
·
Scanning of encrypted data streams
·
Streamlines manual testing
·
Automation and artificial intelligence
·
Faster network speeds
Question 13: What was a benefit of second generation sandbox
technology?
Select one:
·
Scanning of encrypted data streams
·
Automation and artificial intelligence (AI)
·
Faster network speeds
·
Timely sharing of threat intelligence
0 Comments