Sandbox Quiz Answer NSE 2
Fig 1: Sandbox Quiz Answer NSE 2 |
Question 1: Which two problems was Network security experiencing before the introduction of a sandbox solution? (Choose two.)
· Network security was unable to handle a coordinated attack using different threat vectors and methods.
· AVs were not introduced into network security.
· Security devices did not communicate with other security devices on the network.
· Firewalls were non-existent.
Question 2: For which two reasons was the sandbox solution added to network security? (Choose two.)
· Firewalls were quite sufficient but better risk management was needed.
· Firewalls and AVs were helpless against unknown threats.
· Unknown threats needed to be quarantined.
· AVs were able to stop unknown threats, but firewalls could not.
Question 3: How does sandbox solve the problem of aggregating threat intelligence data?
· By sharing malicious code with all devices on the network
· By sharing valuable threat intelligence to the security devices on its network
· By alerting administrators to threats
· By executing malicious code in multiple isolated environments
Question 4: What are two characteristics of a sandbox? (Choose two.)
· A sandbox only provides completely independent protection of IOT devices.
· If something unexpected or malicious happens, it affects only the sandbox.
· A sandbox provides full network security.
· A sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network.
Question 5: Which two business problems is FortiSandbox trying to solve? (Choose two.)
· Nonexistent or inadequate firewall protection
· Insufficient fine-tuning of network performance
· The choice of performance over security by businesses
· The potential to exploit OS or application weaknesses with malignant code
Question 6: What is the purpose of the sandbox?
· To stop all BYOD network traffic
· To flag and pass the known exploit to the endpoint to handle
· To observe the activity of unknown code in a quarantined environment
· To run vulnerability scans on all network endpoints
Question 7: What is a zero-day attack?
· Exploiting a vulnerability scanner
· Vulnerability scanning from the zero-day
· Exploiting only zero-day configured firewalls.
· Exploiting an unknown deficiency in code.
Question 8: Which new development in malware caused sandbox technology
to automate and introduce artificial intelligence learning?
Select one:
· AI-driven attacks*
· Trojan horse
· Ransomware
· Polymorphic viruses
Question 9: Which feature in early networks made aggregating
threat intelligence difficult?
Select one:
· Hybrid cloud environments
· Virtualization
· Segmentation
· Point solutions
Question 10: Which failing characterized early sandbox
technology?
Select one:
· Could not stop zero-day attacks/
· Failed to categorize malware/
· Lack of integration with other security devices
· Slowed network traffic
Question 11: Within the computer security context, what is a
sandbox?
Select one:
· An isolated virtual environment to test suspicious files and hyperlinks*
· A process used to identify, describe, and categorize malware
· A service in the Cloud used to collect and share threat intelligence
· A segment of the network reserved for testing unknown programs
Question 12: Which feature characterizes third-generation
sandbox technology?
Select one:
· Scanning of encrypted data streams
· Streamlines manual testing
· Automation and artificial intelligence
· Faster network speeds
Question 13: What was a benefit of second generation sandbox
technology?
Select one:
· Scanning of encrypted data streams
· Automation and artificial intelligence (AI)
· Faster network speeds
· Timely sharing of threat intelligence