Está en la página 1de 2

1/10/2020 Sandbox Quiz

 The Evolution of Cybersecurity

Started on Friday, 10 January 2020, 4:02 AM

State Finished
Completed on Friday, 10 January 2020, 4:05 AM
Time taken 3 mins 42 secs
Marks 4/5
Grade 70 out of 100
Feedback I'm sorry, you did not pass.

Question 1 What happens to the code if the sandbox detects that it has malicious intent? 

Mark 0 out of 1

Select one:
The code is passed to FortiGate to be handled.

The code could be expunged.

The code is registered as “malware”, and then passed to the firewall.

The code is flagged as a “malware” and passed to the endpoint to handle. 

Question 2 What is the purpose of the sandbox? 


Mark 1 out of 1

Select one:
To run the vulnerability scan on all network endpoints.

To observe the activity of unknown code in a quarantined environment. 

To flag and pass the known exploit to the endpoint to handle.

To stop all the BYODs network traffic.

Question 3 What are the problems that network security was experiencing before sandbox?   (Choose two.)
Partially correct

Mark 1 out of 1

Select one or more:

AVs were not introduced into network security. 

The security products did not communicate with other security devices on the network.

Its inability to handle a coordinated attack using different threat vectors and methods. 

Firewalls were non-existent.

Question 4 What are the sandbox characteristics?  (Choose two.)


Mark 1 out of 1

Select one or more:

If something unexpected or wanton happens, it affects only the sandbox. 

Sandbox provides the full network security.

Sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network. 

Sandbox only provides completely independent IOTs protection. 1/2
1/10/2020 Sandbox Quiz

Question 5 Pick two reasons why the sandbox solution was added to network security?  (Choose two.)

Mark 1 out of 1

Select one or more:

Unknown threats needed to be quarantined. 

AVs were able to stop unknown threats, but firewalls couldn’t.

Firewalls were quite sufficient but better risk management was needed.

Firewalls and AVs were helpless against unknown threats.  2/2