Fortinet NSE-2 Questions and Answers Already Passed
Fortinet NSE-2 Questions and Answers Already Passed In which two ways does FortiGate solve security issues with SD-WAN? 1. Integrates with FortiSandbox and provides SSL inspection. 2. Includes application control, URL filtering, IPS. Which Fortinet product provides both SD-WAN and NGFW security? FortiGate What are two advantages of having integrated security and SD-WAN in a single appliance? 1. Provides application control for encrypted traffic. 2.Provides secure direct Internet access. What are three major weaknesses of the traditional network that SD-WAN solves? 1. Provides direct internet access to SaaS applications. 2. Reduces application latency. 3. Reduces network downtime. Which two statements about SD-WAN are true? 1. Malware protection is always built into SD-WAN. 2. Traffic control is a signification feature of SD-WAN. 3. SD-WAN adds complexity to network deployment. 4. SD-WAN can provide application visibility. 2. Traffic control is a significant feature of SD-WAN 4. SD-WAN can provide application visibility. What are the two major weaknesses of SD-WAN? 1. No inherent defense against advanced threats. 2. Encrypting data conceals viruses that can bypass an antivirus check. What are two attributes of an SD-WAN network? 1. Augments MPLS with affordable broadband connections 2. Simplifies with zero-touch provisioning and centralized control Which method did early antivirus products use to detect malware? They compared the signature of the file with a list of known virus signatures. What were early endpoints security products known as? Antivirus software Why is the security of endpoints devices important? (Choose two.) 1. Endpoints hold valuable data. 2. Endpoints can be a way to access other important data and devices on the network. Which device not considered an endpoint device? 1. Ethernet switch 2. Laptop 3. IoT device 4. Smartphone 1. Ethernet switch How did the rise of the Internet affect the rate at which new malware variants appear? The rate increased tremendously In addition to existing, known threats, what other types of threats must modern endpoint solutions detect? Unknown threats What happens when each known malware file is represented by a one-to-one signature approach? It does not scale well, because the number of malware files increases by millions or more each day. What statement about cyber-attacks is true? 1. Security products and threat intelligence services that can act together in real time stand the best chance of stopping these attacks 2. There is no secrecy within security vendors and all information is shared. 3. As bad actors continue to evolve it is important to invest in expensive security products. 4. It is important that individuals become more aware of and knowledgeable about any attacks. 5. Sharing intelligence among security vendors is the best way to fight threats. 1. Security products and threat intelligence services that can act together in real time stand the best chance of stopping these attacks. In the early days of threat intelligence service, in which three timeframes were vendor updates released? (Choose three.) 1. Once a year 2. Monthly 3. Quarterly Which are three functions of sandboxing? (choose three) 1. Sandboxing products take a suspect file and places it in an environment where its behaviors can be closely analyzed. 2. Sandboxes can send the details to the vendor's threat intelligence service so that the details can be shared worldwide. 3. Depending on the configuration, the owner of the sandbox can propagate this new knowledge across their network security environment. The threat intelligence service catalogs data about existing or emerging attacks, including the specific mechanisms of the attack, and evidence that the attack has happened. What is the data also known as? Indicators of compromise What happened when malware became more sophisticated and able to change its own file content? A single type of malware became an entire malware family, consisting of perhaps thousands of different files, but each file performing the same bad behaviors.
Written for
- Institution
- Fortinet NSE-2
- Course
- Fortinet NSE-2
Document information
- Uploaded on
- December 21, 2023
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
fortinet nse 2 questions and answers already passe
Also available in package deal