Fortinet NSE 2 Lesson8-Sandbox Quiz

Q1. How does sandbox solve the problem of aggregating threat intelligence data?

Select one:
By alerting administrators to threats
By sharing valuable threat intelligence to the security devices on its network
By sharing malicious code with all devices on the network
By executing malicious code in multiple isolated environments

Q2. What are two characteristics of a sandbox? (Choose two.)

Select one or more:
A sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network.
A sandbox provides full network security.
If something unexpected or malicious happens, it affects only the sandbox.
A sandbox only provides completely independent protection of IOT devices.

Q3. Which two business problems is FortiSandbox trying to solve? (Choose two.)

Select one or more:
The potential to exploit OS or application weaknesses with malignant code
Insufficient fine-tuning of network performance
The choice of performance over security by businesses
Nonexistent or inadequate firewall protection

Q4. For which two reasons was the sandbox solution added to network security? (Choose two.)

Select one or more:
AVs were able to stop unknown threats, but firewalls could not.
Unknown threats needed to be quarantined.
Firewalls were quite sufficient but better risk management was needed.
Firewalls and AVs were helpless against unknown threats.

Q5. What is the purpose of the sandbox?

Select one:
To stop all BYOD network traffic
To flag and pass the known exploit to the endpoint to handle
To observe the activity of unknown code in a quarantined environment
To run vulnerability scans on all network endpoints

2 Replies to “Fortinet NSE 2 Lesson8-Sandbox Quiz”

  1. What is a zero-day attack?
    Select one:
    Exploiting a vulnerability scanner
    Vulnerability scanning from the zero-day
    ****Exploiting an unknown deficiency in code. ****
    Exploiting only zero-day configured firewalls.

  2. Which two problems was network security experiencing before the introduction of a sandbox solution? (Choose two.)
    Select one or more:
    AVs were not introduced into network security.
    ****Network security was unable to handle a coordinated attack using different threat vectors and methods.
    ****Security devices did not communicate with other security devices on the network.
    Firewalls were non-existent.

Comments are closed.