Fortinet NSE 2 Lesson11-Web Application Firewall Quiz

Q1. When considering web application firewalls, what two factors make a signature-based approach to defense, obsolete? (Choose two.)

Select one or more:
Signature-based detection is too slow to identify threats.
Signatures cannot stop SQL injection attacks.
Signature-based detection, when used alone, can generate many false positives.
Signature-based detection is not effective against zero-day exploits.

Q2. In which two ways does machine learning help make modern web application firewalls more effective? (Choose two.)

Select one or more:
It allows them to perform behavior analysis at machine speed.
It allows them to return search results quicker than using traditional filtering methods.
It allows them to adapt to the ever-changing attributes of threats.
It allows them to choose the most appropriate web application for a given task.

Q3. Which was the predecessor to a web application firewall?

Select one:
Antivirus software
Application firewall
Internet filter
Web firewall

Q4. Which two products can be integrated with FortiWeb? (Choose two.)

Select one or more:
FortiPhone
FortiSandbox
FortiConnect
FortiFax
FortiGate

Q5. Which statement about integrating FortiGuard Labs with FortiWeb, is true?

Select one:
FortiGuard Labs provides vital updates to FortiWeb about new threats.
FortiGuard Labs can be integrated with other Fortinet products, as well as FortiWeb.
FortiGuard Labs is an optional feature that does not provide any benefits to FortiWeb.
FortiGuard Labs provides machine learning features to FortiWeb.

Q6. What do web application firewalls do that traditional edge firewalls do not?

Select one:
Block port numbers
Block SQL injection attacks
Block MAC addresses
Block protocols

Q7. What does a web application firewall do?

Select one:
It allows applications to access online content.
It prevents applications from accessing the web at certain times of the day.
It provides a means for businesses to monitor which web applications their users are accessing.
It monitors and blocks malicious HTTP/HTTPS traffic to and from a web application.

Bir Cevap Yazın