Está en la página 1de 3

SANDBOX QUIZ

Started on Monday, 21 October 2019, 12:50 AM


State Finished
Completed on Monday, 21 October 2019, 12:55 AM
Time taken 4 mins 36 secs
Marks 4/5
Grade 80 out of 100
Feedback Congratulations, you have passed!
Question 1
Partially correct
Mark 1 out of 1

Flag question

Question text

What business problems is FortiSandbox trying to solve? (Choose two.)

Select one or more:


Presence of malignant code that is designed to exploit a specific weakness in an OS or
application.
Need for firewall protection.
Network performance tuning is needed.
Between security and performance, business often chooses performance.

Question 2
Correct
Mark 1 out of 1

Flag question

Question text

What are the sandbox characteristics? (Choose two.)


Select one or more:
Sandbox confines the actions of code to the sandbox device and in isolation to the rest
of the network.
Sandbox only provides completely independent IOTs protection.
If something unexpected or wanton happens, it affects only the sandbox.
Sandbox provides the full network security.

Question 3
Correct
Mark 1 out of 1

Flag question

Question text

What is the purpose of the sandbox?

Select one:
To run the vulnerability scan on all network endpoints.
To flag and pass the known exploit to the endpoint to handle.
To observe the activity of unknown code in a quarantined environment.
To stop all the BYODs network traffic.

Question 4
Correct
Mark 1 out of 1

Flag question

Question text

Pick two reasons why the sandbox solution was added to network security? (Choose
two.)

Select one or more:


Firewalls and AVs were helpless against unknown threats.
Unknown threats needed to be quarantined.
Firewalls were quite sufficient but better risk management was needed.
AVs were able to stop unknown threats, but firewalls couldn’t.

Question 5
Partially correct
Mark 1 out of 1

Flag question

Question text

What are the problems that network security was experiencing before
sandbox? (Choose two.)

Select one or more:


The security products did not communicate with other security devices on the network.
AVs were not introduced into network security.
Its inability to handle a coordinated attack using different threat vectors and methods.
Firewalls were non-existent