FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced

Fortinet – Technical Introduction to Cybersecurity Exam Quiz Answers

Module 1: Cryptography and the Public Key Infrastructure Quiz answers

Question: Identify two symmetric algorithms. (Choose two.)

Question: During the encryption process, where symmetric and asymmetric cryptography are used, which key is used to encrypt the session (symmetric) key?

Question: Which cipher type is used by computers to encrypt data?

Question: What ingredient is added during the BCRYPT key stretching process to increase entropy?

Question: Which statement best describes hashing?

Question: Which two entities are necessary components of a PKI? (Choose two.)

Question: In a PKI, what is the ultimate source of trust?

Question: Which two features are characteristics of hashing? (Choose two.)

Question: Which security requirement does encryption satisfy?

Question: Which statement best describes encryption?

Question: Which two security requirements are satisfied by a digital signature? (Choose two.)

Question: Which statement best describes cryptography?

Question: Identify three cipher method types. (Choose three.)

Module 2: Secure Network Quiz answers

Question: Why should a user prefer a security protocol over a non secured one?

Question: What was missing in the early sandbox generation? (Choose two.)

Question: How can a security engineer secure switching and ports?

Question: Why is Fortinet Security Fabric an example of centralized security network management? (Choose two.)

Question: Which network is enclosed by the security perimeter?

Question: how can a security architect better control and protect the east-west traffic in a DeMilitarized Zone (DMZ)?

Question: Why would a security architect segment a network? (Choose two.)

Question: What are objectives of Software Defined Wide Area Network (SD-WAN)? (Choose two.)

Question: Which principles are part of the Zero-Trust security model? (Choose two.)

Question: Why knowing the source IPs of an attack may not be relevant? (Choose two.)

Question: When implementing Zero-Trust security, which benefits do you expect? (Choose two.)

Question: Which challenges brought the evolution from a network model with a single, dedicated service provider to Software Defined Wide Area Network (SD-WAN)? (Choose two.)

Question: Which implementation should be done by a security architect to limit network threats in a network? (Choose two.)

Question: What does Secure Multipurpose Internet Mail Extensions (S/MIME) bring over MIME? (Choose two.)

Question: Why may a security architect add a sandbox in a network? (Choose two.)

Question: When implementing a data fabric architecture, which benefits do you expect?  (Choose two.)

Question: What are two core capabilities of Secure Access Service Edge (SASE)? (Choose two.)

Question: View the following exhibit:In this SD-WAN environment, what does the red line represent?

Question: A security compliance audit must take place. Which implementation can simplify it?

Question: Which application could provide the list of open ports to a security engineer, so the unnecessary ones can be closed?

Question: View the following exhibit: What will be at least checked by the firewall upon receiving the server reply packet?

Question: Which required capabilities are included in Secure Access Service Edge (SASE)? (Choose two.)

Question: What are the benefits for a bank in taking a Next Generation FireWall (NGFW) to secure its network? (Choose two.)

Question: A security architect would like to add in a network a device able to understand the application layers protocols. Which device should be added?

Question: How could the traffic be filtered at the security perimeter? (Choose two.)

Question: A network architect must implement security in a network including Internet of Things (IoT), Bring your own Device (ByoD), and cloud-based workstations. Which model should the architect put in place?

Question: Why should a security engineer secure a switch? (Choose two.)

Question: What does Secure Access Service Edge (SASE) offer to remote off-net users compared to on-net?

Question: how can a security architect segment a network? (Choose two.)

Question: Which type of attack is handled only by the latest sandbox generation?

Question: Which protocols should a security engineer disable for management access? (Choose two.)

Question: A security architect must put in place the Zero-Trust model in a network. Which methods could the architect implement? (Choose two.)

Question: View the following exhibit: How can a security architect secure the switch to reduce a Media Access Control (MAC) flooding attack performed by the device D?

Module 3: Authentication and Access Control Quiz answers

Question: Which is an example of a possession-based authentication method?

Question: Which two are aspects of the principle of least privilege? (Choose two.)

Question: Which two are the responsibilities of an authentication governing body? (Choose two.)

Question: What type of access control allows the device or person performing the authentication the ability to allow or deny access?

Question: Which two should be selected to create secure multi-factor authentication to access a computer system? (Choose two.)

Question: Which two are performed by the supplicant in 802.1x authentication? (Choose two.)

Question: What does a NAC use to identify attached devices and allow access?

Question: Which one makes the allow or deny decision in the authentication process?

Question: Which protocol can perform SSO?

Question: Which type of access control scheme does a NAC apply?

Question: In SSO authentication, which two entities know the unhashed credentials? (Choose two.)

Question: Which three can be used as attributes in attribute-based access control? (Choose three.)

Module 4: Secure Remote Access Quiz answers

Question: Which statement best describes secure remote access?

Question: Which characteristic differentiates ZTNA from VPN?

Question: Which statement best describes the zero trust approach that is the basis for ZTNA design?

Question: In SSL VPN, what is used to authenticate the web server to the browser?

Question: In which part of a packet is the readable message to the recipient written?

Question: Which two security features can be implemented by IPsec VPN? (Choose two.)

Question: Which two traits differentiate SSL VPN from IPsec VPN? (Choose two).

Question: Which characteristic differentiates SSL VPN from IPsec VPN and ZTNA?

Module 5: Endpoint Security Quiz answers

Question: Which item would be considered part of the Internet of Things (IoT)?

Question: What is the best tool to help counter polymorphic malware?

Question: What should you always do before allowing IoT and BYOD endpoints to connect to a secure network?

Question: What is the first step in securing IoT devices in a company or home?

Question: What are the two most common communication protocols used by IoT devices? (Choose two.)

Question: What is usually performed by the endpoint detection and response (EDR) client and not by the endpoint protection platform (EPP) client?

Question: What is the primary concern about endpoint detection and response (EDR)?

Question: Which three things should you use on all connected devices, if available? (Choose three.)

Module 6: Secure Data and Applications Quiz answers

Question: Which two recommendations should you make to a chief security officer in order to block phishing attempts and their effects? (Choose two.)

Question: A security engineer would like to create a browsing group policy for application hardening. Which two features should the policy include? (Choose two.)

Question: Which characteristic could a digital signature lend to a document?

Question: Which tool could be denying access to the page?

Question: Which two security features are included only in the latest generation WAF? (Choose two.)

Question: In a school, which safeguards could a security architect implement to help protect children from inappropriate content?

Question: The best position for a WAF is in front of which network component?

Question: Which two measures should a company take to prevent doxwares and leakwares? (Choose two.)

Question: Which factors should a security engineer verify to ensure an organization’s data comply with data sovereignty laws and policies?

Question: Which two tasks should a security engineer perform to protect private data for an organization? (Choose two.)

Question: Which product should a security architect use first to prevent zero-day attacks?

Question: For which reason could a data center have a separate disaster recovery center?

Question: A security engineer must manage the devices of a large company. Which measures should they implement as part of application hardening?

Question: Which component should a company implement to secure sensitive data in their internal servers?

Question: A chief security officer would like to prevent ransomware in their organization. Which two techniques should you recommend? (Choose two.)

Module 7: Cloud Security and Virtualization Quiz answers

Question: Why is it important to secure all virtual machines (VMs) on a hypervisor?

Question: What is the advantage of using a cloud access security broker (CASB) to make application programming interface (API) connections to cloud providers?

Question: What is an example of Infrastructure-as-a-Service (IaaS)?

Question: Which two security services can be performed as Security-as-a-Service (SECaaS)? (Choose two.)

Question: Which type of proxy sits in front of the protected server and brokers connections before allowing traffic to pass to its destination?

Question: Which two roles are responsible for securing cloud applications? (Choose two.)

Question: Which two actions should you take to secure your data in the cloud? (Choose two.)

Question: Which three security devices are hosted in the cloud? (Choose three.)

Question: Which two protocols can you use as a single sign-on (SSO) protocol for cloud applications? (Choose two.)

Question: What is a common threat to cloud environments?

Question: What is a multi-cloud environment?

Question: Which security product allows visibility into a cloud environment and examines it for risk, threats, and compliance?

Question: Why do virtual machines (VMs) increase the potential attack surface?

Question: What would you install in front of a protected cloud network to partition it from the internet?

Question: What runs on a laptop, desktop, or server, and allows you to create a virtual machine (VM)?


Change Lifehub CyberSecurity.pdf