Thanks for Visiting my channel
Certificate FGT NSE 02 Network Security Associate Quiz Lesson - FULL
NSE 2 Firewall
Q1. What was a limitation of first-generation firewalls?
Select one:
Could not distinguish between malicious and legitimate applications
Granular policy capability made managing the firewall too complex
Produced many false positives, thereby overwhelming IT security
Filtered only at layer 3 of the OSI model
Q2. Which three traits are characteristics of a next generation firewall (NGFW)? (Choose three.)
Select one or more:
Inspects only unencrypted packets
Controls network traffic based on network address only
Can segment a network based on user, device, and application type
Controls applications based on type or who the user is
Delivers high-performance inspection
Q3. Complete the sentence. A packet filter firewall controls network traffic based on
Select one:
network addresses, protocols, and ports.
application behaviour or characteristics.
filtering layers 2—7 of the OSI model.
the behaviour of the network connections.
Q4. Which two types of firewalls can block a connection based on application type? (Choose two.)
Select one or more:
Second generation stateful
Application layer
Packet filter
Next-generation firewall (NGFW)
Q5. Which firewall generation can you configure to allow a user to connect to Facebook, but not watch videos from that site?
Select one:
Stateful firewall
Packet filter firewall
Dynamic packet firewall
Next-generation firewall (NGFW)
NSE 2 Network Access Control
Q1. Why are IoT devices potential conduits of contagion?
Select one:
There are too many incompatible IoT security standards in use
Not able to install security software
IoT devices are often cheaply made
Does not support two-factor authentication
Q2. What action do you typically need to do to join a public network, such as one in a coffee shop?
Select one:
Submit your personal digital certificate
Provide biometric information
Register your handheld device
Agree to the legal terms for using the network
Q3. Which three parties participate in network authentication, according to the IEEE 802.1X standards? (Choose three.)
Select one or more:
Certification authority
Client device
Authenticator
Router
Authentication server
Q4. How does NAC effectively segment a network?
Select one:
User role
Device profile
Routers
IP address
Q5. What drives organizations to buy IoT devices?
Select one:
Mandated by government
Provide valuable data to the CFO
Required as part of an air-gap solution
Can save time and money
NSE 2 Endpoint Security
Q1. Which description best identifies file-based malware?
Select one:
A downloaded file, which when opened, runs malicious code or a script
A large number of irrelevant or inappropriate messages sent over the internet
The use of deception to manipulate individuals into divulging confidential information
Exploits security loopholes and spreads only in the device memory
Q2. Which type of malware seriously reduced the effectiveness of signature-based antivirus?
Select one:
Adware
Social engineering
File-based
Polymorphic
Q3. Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)
Select one or more:
Forensics
Remediation tools
Data protection through encryption
Antivirus (AV)
Web filtering
Q4. Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)
Select one or more:
Virtual patches
Machine learning (ML)
Forensics
Remediation
Q5. Why do threat actors target endpoints in a network?
Select one:
Antivirus software on endpoints is inferior to that on servers.
Compromising endpoints offers a greater challenge.
They are an easy point of entry into a network.
Endpoints have a greater monetary value than other assets, such as a database.
NSE 2 Wi-Fi
Q1. Which two features of Wi-Fi Protected Access 3 (WPA3) strengthened security? (Choose two.)
Select one or more:
The handshake for establishing connections became more secure.
Digital signatures were introduced to help identify valid access points (APs).
Complex passphrases were enforced.
The encryption key size was lengthened.
Q2. What weakness of Wired Equivalent Privacy (WEP) made it unsuitable to secure Wi-Fi communications?
Select one:
It did not enforce complex passwords.
The RC4 encryption algorithm was easily defeated.
It did not support digital signatures.
It was susceptible to man-in-middle attacks.
Q3. Which two security practices make your home wireless network safer? (Choose two.)
Select one or more:
Install antivirus software on all Wi-Fi devices.
Keep your router firmware up to date.
Pick passphrases that are hard to guess.
Consult with NIST as to the latest security strategies.
Q4. What is Wi-Fi?
Select one:
An Ethernet networking protocol
Fiber that makes wireless technology possible
Technology for radio wireless local area networks
Quality audio technology
Q5. Wi-Fi is based on which standard?
Select one:
10Base-T
RFC 826
IEEE 802.11
ISO 5750
NSE 2 Cloud Security
Q1. Identify the correct description for IaaS.
Select one:
Integrates multi-cloud environments with the on-premises network
Provides an online platform for developing software delivered over the internet
Allows you to rent, or use for free, software, like Google Mail
Allows you to rent virtualized data infrastructure without having to physically manage it on premises
Q2. What is an example of SaaS?
Select one:
FortiWeb
Google mail
AWS
OS patching
Q3. Who has ultimate responsibility for the safety of the customer’s data and services hosted in the cloud?
Select one:
The cloud service provider
The Interpol cloud security service
The cloud security syndicate
The customer
Q4. Identify a potential problem that customers risk if they rely solely on vendor cloud security tools.
Select one:
The tools can be expensive because they are based on a metered per-incident basis.
The tools provide basic security and do not secure all facets of a multi-cloud environment.
The tools can interfere with BYOD and other Wi-Fi devices.
The tools are too complicated and consume too many valuable MIS resources..
Q5. Which reason drove organizations to use cloud services?
Select one:
Use of browser-based applications that on-premises servers could not.
Greater security for organizational data and services.
Cost savings by paying for only what computer services were needed.
Greater access and control of the business data..
NSE 2 Threat Intelligence Services
Q1. Which method best defeats unknown malware?
Select one:
Predicted malware detection
Signature-based detection
Web filtering
Sandboxing
Q2. Which two organizations are examples of a threat intelligence service that serves the wider security community? (Choose two.)
Select one or more:
NIST
Malware-as-a-Service
Cyber Threat Alliance
FortiGuard Labs
Q3. Which statement best describes an indicator of compromise (IoC)?
Select one:
A list of network devices that are known to be compromised
Sources of potential threat actors and their sponsors
Evidence that a cyberattack has happened or is ongoing
Valuable information about computer systems and the network
Q4. What is the sandbox detection method known as?
Select one:
Heuristic detection
Rule-based detection
Check sum detection
Signature-based detection
Q5. In the early days, with which three frequencies did vendors update AV signatures? (Choose three.)
Select one or more:
Bi-annually
Monthly
Weekly
Annually
Quarterly
NSE 2 Sandbox
Q1. Which feature in early networks made aggregating threat intelligence difficult?
Select one:
Virtualization
Segmentation
Point solutions
Hybrid cloud environments
Q2. Within the computer security context, what is a sandbox?
Select one:
A service in the Cloud used to collect and share threat intelligence
A segment of the network reserved for testing unknown programs
An isolated virtual environment to test suspicious files and hyperlinks
A process used to identify, describe, and categorize malware
Q3. Which feature characterizes third-generation sandbox technology?
Select one:
Streamlines manual testing
Scanning of encrypted data streams
Faster network speeds
Automation and artificial intelligence
Q4. Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning?
Select one:
Ransomware
AI-driven attacks
Polymorphic viruses
Trojan horse
Q5. What is a zero-day attack?
Select one:
Malware that converts all data bits to zeros
A new and unknown computer virus
A cyberattack that exploits an unknown software vulnerability
A computer virus that receives instructions from a Command and Control server
NSE 2 Secure Email Gateway
Q1. Which option identifies the trend of phishing?
Select one:
Increasing
Plateaued
Erratic
Declining
Q2. Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?
Select one:
Volume of attacks
Data loss
Success of click-bait
Delay in implementing the sender policy framework
Q3. Which technique used by threat actors is known as phishing?
Select one:
An attacker observes websites that a targeted group visits, and herds them into an infected website
A fraudulent practice of sending emails purporting to be reputable in order to steal information
Fraudulent messages that target a specific role or person within an organization
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
Q4. Which method did the earliest spam filter use to stop spam?
Select one:
Detected unusual behaviour
Detected illegitimate email addresses
Tested emails in a sandbox environment
Identified specific words or patterns
Q5. Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)
Select one or more:
Click bait
An infected thumb drive
An embedded hyperlink within an email
An attachment to an email
NSE 2 Web Filter
Q1. Which two reasons gave rise to web filters? (Choose two.)
Select one or more:
Web filters promote education.
Web filters stop objectionable content.
Web filters improve security.
Web filters reduce network traffic.
Q2. Which two actions describe how web filters work? (Choose two.)
Select one or more:
Web filters consult a threat actor database.
Web filters apply heuristic analysis.
Web filters consult URL deny lists and allow lists.
Web filters filter sites by keywords and predefined content.
Q3. Which attribute best describes how early web filters worked?
Select one:
Web filter use heuristics.
Web filters use big data comparative analysis.
Web filters are rule-based.
Web filters are role-based.
Q4. What task can other types of web filters perform?
Select one:
Facilitating network traffic throughput
Categorizing content
Testing files on segregated VMs
Searching for content
Q5. How did web filters improve computer security?
Select one:
They blocked lewd websites.
They blocked adware, spam, viruses, and spyware.
They prevented denial of service attacks.
They tested all URLs in segregated VMs to see what they would do.
NSE 2 Security Information & Event Management
Q1. Which feature is a characteristic of later SIEMs?
Select one:
Automatic backups and integrity checking
User and entity behavior analytics (UEBA)
Deciphering encrypted data flows
Collect, normalize, and store log events and alerts
Q2. Which problem was a barrier to the general acceptance of first-generation SIEM?
Select one:
Cost to purchase was prohibitive
Did not have the features needed by organizations
The point solution approach to network security
High-level of skill was required
Q3. Which compliance, if ignored by businesses, hospitals, and other organizations, can result in punitive fines?
Select one:
Complying to machine learning checks
Complying to automatic backups and integrity checks
Complying to User and entity behavior analytics (UEBA)
Complying to regulations
Q4. Which feature provides SIEM greater visibility into the entire network?
Select one:
Complying with regulations
Analyzing logs and alerts from a single-pane-of-glass
Sharing of logs by IoTs and BYODs
Deciphering encrypted logs and alerts
Q5. Which two requirements were the motivation for SIEM? (Choose two.)
Select one or more:
Complying to regulations
Increasing number of alerts
Exploiting Big Data
Remaining competitive
NSE 2 SASE
Q1. What does the term “Thin Edge” refer to?
Select one:
Branch locations with minimal security that are attached to a core network
Remote users
A poorly protected network
An organization that consumes little to no cloud-based services
Q2. Which statement is true regarding how SASE is delivered?
Select one:
SASE must be delivered using cloud-based services only
SASE is delivered only to remote users, and not to branch offices
SASE must be delivered using a combination of physical on premise devices and cloud-based services
SASE is delivered using a combination of cloud-based services and optional physical on premise devices
Q3. What are three core capabilities of SASE? (Choose three)
Select one or more:
Zero-Trust network access
Threat intelligence sharing
Next-Generation firewall
Data loss prevention
Security Fabric management
Q4. What are two benefits of SASE? (Choose two)
Select one or more:
Consistent security for mobile workforces
Optimized paths for all users to all clouds to improve performance and agility
Limits “Bring-Your-Own-Device” behavior in the organization
Shift from operating expense to capital expense
Limits the number of remote off network users connecting to cloud-based applications
Q5. For network security, which three challenges have emerged as a result of rapid and disruptive digital innovation? (Choose three)
Select one or more:
Expanding attack surface
Too few security vendors to choose from
Evolving compliance requirements
Resistance to multi-cloud adoption from the enterprise
Growing number of off-network users accessing the central data center, without proper security
NSE 2 SD-WAN
Q1. Which two benefits are gained from using an SD-WAN centralized management console? (Choose two.)
Select one or more:
Greater network visibility
An ability to prioritize business-critical applications
Greater data protection
A diversity of management consoles and processes
Q2. Which business trend caused greater latency to the internet in the network model for the single, dedicated service provider?
Select one:
Demand for more cloud applications and services
Greater expenditures on research and development
Moving from physical appliances to virtual appliances
A focus on more capital expenditures
Q3. Complete the sentence. WAN is a computer network that
Select one:
spans a large geographic area and typically consists of two or more LANs.
limits the number of switches and routers to reduce maintenance and administration.
uses primarily virtual computers, thus expanding the east-west axis.
is a hybrid of on-premise devices and virtual servers across multiple cloud vendors.
Q4. Why might managing multiple point products cause greater complexity for IT security? (Choose two.)
Select one or more:
Lack of integration between security products
Greater streamlined security processes
Usually, multiple management consoles are required
Understaffed IT security teams who lacked expertise
Q5. Earlier businesses used a single, dedicated service provider to connect to the internet. What was the primary weakness of this design?
Select one:
Inexpensive
Overly complex
Unsecure
Unreliable
NSE 2 Web Application Firewall
Q1. Which protocol traffic does a web application firewall (WAF) monitor?
Select one:
TCP
HTTP
IP
CLNP
Q2. Which firewall is positioned between a web application and the Internet?
Select one:
Segmentation firewall
Edge firewall
Packet filter firewall
Web application firewall
Q3. Which event was the motivation for web application firewall (WAFs)?
Select one:
The first wide area network (WAN)
ARPANET was brought online
The debut of the World Wide Web
The development of the hypertext transfer protocol
Q4. Which new feature characterized second-generation WAFs?
Select one:
Machine learning without human supervision
Port and protocol blocking
Packet analysis
Heuristics
Q5. Which three features are characteristics of the latest generation WAF? (Choose three.)
Select one or more:
DDoS defense
Network segmentation
DLP
SPU
IP reputation
NSE 2 SOAR
Q1. What is a common use case for an implementation of SOAR by customers?
Select one:
Guarding against DoS attacks
Logging events and alerts
Phishing investigations
Detecting zero-day attacks
Q2. Which statement best describes SOAR?
Select one:
SOAR connects all security tools together into defined workflows that can be run automatically
SOAR orients the security team by defining and categorizing cyberattacks
SOAR collects logs from all security tools to improve network visibility
SOAR plays out potential cyberattacks to improve network security preparedness
Q3. Which is a benefit of SOAR?
Select one:
It increases security team efficacy by automating repetitive processes
It reports on which endpoints require patching and have security vulnerabilities
It analyzes and generates a security score to measure improvements in network security
It deflects DDoS attacks and identifies the Command and Control source
Q4. What are playbooks used for?
Select one:
To plan a set of manual tasks to be completed by analysts
To automate the actions that an analyst would typically do manually
To describe the order in which analysts complete tasks
To provide a set of scenarios of predicted cyberattack methods
Q5. What are three reasons SOAR is used? (Choose three.)
Select one or more:
Analyze workload
Reduce alert fatigue
Compensate for the skill shortage
Collaborate with other analysts
Accelerate response times
No comments:
Post a Comment