Está en la página 1de 2

2/19/2020 Sandbox Quiz

 The Evolution of Cybersecurity

Started on Wednesday, 19 February 2020, 5:13 AM


State Finished
Completed on Wednesday, 19 February 2020, 5:16 AM
Time taken 2 mins 43 secs
Marks 5/5
Grade 100 out of 100
Feedback Congratulations, you have passed!

Question 1 What are the problems that network security was experiencing before sandbox?   (Choose two.)
Correct

Mark 1 out of 1

Select one or more:


Its inability to handle a coordinated attack using different threat vectors and methods. 

The security products did not communicate with other security devices on the network. 

AVs were not introduced into network security.

Firewalls were non-existent.

Question 2 What is the purpose of the sandbox? 


Correct

Mark 1 out of 1

Select one:
To observe the activity of unknown code in a quarantined environment. 

To stop all the BYODs network traffic.

To run the vulnerability scan on all network endpoints.

To flag and pass the known exploit to the endpoint to handle.

Question 3 What business problems is FortiSandbox trying to solve?  (Choose two.)


Correct

Mark 1 out of 1

Select one or more:


Between security and performance, business often chooses performance. 

Network performance tuning is needed.

Need for firewall protection.

Presence of malignant code that is designed to exploit a specific weakness in an OS or application. 

Question 4 Pick two reasons why the sandbox solution was added to network security?  (Choose two.)
Correct

Mark 1 out of 1

Select one or more:


Unknown threats needed to be quarantined. 

Firewalls and AVs were helpless against unknown threats. 

Firewalls were quite sufficient but better risk management was needed.

AVs were able to stop unknown threats, but firewalls couldn’t.

https://training.fortinet.com/mod/quiz/review.php?attempt=2385502&cmid=12856 1/2
2/19/2020 Sandbox Quiz

Question 5 What happens to the code if the sandbox detects that it has malicious intent? 
Correct

Mark 1 out of 1

Select one:
The code could be expunged. 

The code is flagged as a “malware” and passed to the endpoint to handle.

The code is passed to FortiGate to be handled.

The code is registered as “malware”, and then passed to the firewall.

https://training.fortinet.com/mod/quiz/review.php?attempt=2385502&cmid=12856 2/2