Thanks for Visiting my channel
Sandbox Quiz NSE 2
NSE 2 Lesson 10 – NSE 2 Sandbox
Question 1
Question text
Which feature characterizes third-generation sandbox technology?
Select one:
Faster network speeds
Automation and artificial intelligence
Streamlines manual testing
Scanning of encrypted data streams
Question 2
Question text
What is a zero-day attack?
Select one:
A computer virus that receives instructions from a Command and Control server
A cyberattack that exploits an unknown software vulnerability
A new and unknown computer virus
Malware that converts all data bits to zeros
Question 3
Question text
Within the computer security context, what is a sandbox?
Select one:
A segment of the network reserved for testing unknown programs
A service in the Cloud used to collect and share threat intelligence
A process used to identify, describe, and categorize malware
An isolated virtual environment to test suspicious files and hyperlinks
Question 4
Question text
Which failing characterized early sandbox technology?
Select one:
Failed to categorize malware
Slowed network traffic
Lack of integration with other security devices
Could not stop zero-day attacks
Question 5
Question text
Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning?
Select one:
AI-driven attacks
Ransomware
Trojan horse
Polymorphic viruses
Question 1: Which two problems was network security experiencing before the introduction of a sandbox solution? (Choose two.)
Network security was unable to handle a coordinated attack using different threat vectors and methods.
AVs were not introduced into network security.
Security devices did not communicate with other security devices on the network.
Firewalls were non-existent.
Question 2: For which two reasons was the sandbox solution added to network security? (Choose two.)
Firewalls were quite sufficient but better risk management was needed.
Firewalls and AVs were helpless against unknown threats.
Unknown threats needed to be quarantined.
AVs were able to stop unknown threats, but firewalls could not.
Question 3: How does sandbox solve the problem of aggregating threat intelligence data?
By sharing malicious code with all devices on the network
By sharing valuable threat intelligence to the security devices on its network
By alerting administrators to threats
By executing malicious code in multiple isolated environments
Question 4: What are two characteristics of a sandbox? (Choose two.)
A sandbox only provides completely independent protection of IOT devices.
If something unexpected or malicious happens, it affects only the sandbox.
A sandbox provides full network security.
A sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network.
Question 5: Which two business problems is FortiSandbox trying to solve? (Choose two.)
Nonexistent or inadequate firewall protection
Insufficient fine-tuning of network performance
The choice of performance over security by businesses
The potential to exploit OS or application weaknesses with malignant code
Question 6: What is the purpose of the sandbox?
To stop all BYOD network traffic
To flag and pass the known exploit to the endpoint to handle
To observe the activity of unknown code in a quarantined environment
To run vulnerability scans on all network endpoints
Question 7: What is a zero-day attack?
Exploiting a vulnerability scanner
Vulnerability scanning from the zero-day
Exploiting only zero-day configured firewalls.
Exploiting an unknown deficiency in code.
Lesson 03: Sandbox Quiz Answers
Question: What is a zero-day attack?
A computer virus that receives instructions from a Command and Control server
A new and unknown computer virus
Malware that converts all data bits to zeros
A cyberattack that exploits an unknown software vulnerability
Question: Which failing characterized early sandbox technology?
Lack of integration with other security devices
Could not stop zero-day attacks
Slowed network traffic
Failed to categorize malware
Question: Which feature in early networks made aggregating threat intelligence difficult?
Virtualization
Segmentation
Hybrid cloud environments
Point solutions
Question: Which feature characterizes third-generation sandbox technology?
Scanning of encrypted data streams
Faster network speeds
Streamlines manual testing
Automation and artificial intelligence
Question: What was a benefit of second generation sandbox technology?
Automation and artificial intelligence (AI)
Scanning of encrypted data streams
Faster network speeds
Timely sharing of threat intelligence
Question: Within the computer security context, what is a sandbox?
A service in the Cloud used to collect and share threat intelligence
A segment of the network reserved for testing unknown programs
A process used to identify, describe, and categorize malware
An isolated virtual environment to test suspicious files and hyperlinks
Question: Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning?
Polymorphic viruses
Ransomware
Trojan horse
AI-driven attacks
No comments:
Post a Comment