Lesson 14: Cloud Service Models Quiz Answers Question 1: Identify a potential problem that customers risk if they rely solely on provider cloud security tools. The tools can be expensive because they are based on a metered per-incident basis. The tools provide basic security and do not secure all facets …
Read More »Fortinet Getting Started in Cybersecurity Zero Trust Network Access (ZTNA) Quiz Answers
Lesson 13: Zero Trust Network Access (ZTNA) Quiz Answers Question 1: Which type of information or object can be embedded in a ZTNA tag? Encrypted user ID and password Authentication token Client digital certificate Security posture of the device Question 2: What is a benefit of the ZTNA access proxy? …
Read More »Fortinet Getting Started in Cybersecurity SD-WAN Quiz Answers
Lesson 12: SD-WAN Quiz Answers Question 1: Which two benefits are gained from using an SD-WAN centralized management console? (Choose two.) An ability to prioritize business-critical applications A diversity of management consoles and processes Greater data protection Greater network visibility Question 2: Which feature in the first-generation SD-WAN applied intelligent …
Read More »Fortinet Getting Started in Cybersecurity SIEM Quiz Answers
Lesson 11: SIEM Quiz Answers Question 1: Which two requirements were the motivation for SIEM? (Choose two.) Complying to regulations Increasing number of alerts Remaining competitive Exploiting Big Data Question 2: What was the impetus for more automation and machine learning in later SIEM devices? Shortage of trained personnel Requirement …
Read More »Fortinet Getting Started in Cybersecurity SOAR Quiz Answers
Lesson 10: SOAR Quiz Answers Question 1: What is a common use case for an implementation of SOAR by customers? Guarding against DoS attacks Detecting zero-day attacks Phishing investigations Logging events and alerts Question 2: Which statement best describes SOAR? SOAR collects logs from all security tools to improve network …
Read More »Fortinet Getting Started in Cybersecurity Endpoint Monitoring Quiz Answers
Lesson 9: Endpoint Monitoring Quiz Answers Question 1: Which three strategies help secure unknown endpoints? (Choose three.) Configure network security devices to prevent unauthorized devices from accessing the network Enforce the principle of least privilege Upgrade antivirus software on all known network devices Force devices onto an isolated network until …
Read More »Fortinet Getting Started in Cybersecurity Endpoint Hardening Techniques Quiz Answers
Lesson 8: Endpoint Hardening Techniques Quiz Answers Question 1: Which hardening endpoint category does the principle of least privilege belong to? Endpoint monitoring Administrative controls Endpoint maintenance Local endpoint protection Question 2: Which two techniques can prevent access to information on stolen portable devices? (Choose two.) Encrypt the data stored …
Read More »Fortinet Getting Started in Cybersecurity Wi-Fi Quiz Answers
Lesson 7: Wi-Fi Quiz Answers Question 1: What is Wi-Fi? Fiber that makes wireless technology possible Quality audio technology An Ethernet networking protocol Technology for radio wireless local area networks Question 2: Which two security practices make your home wireless network safer? (Choose two.) Consult with NIST as to the …
Read More »Fortinet Getting Started in Cybersecurity Content Filters Quiz Answers
Lesson 6: Content Filters Quiz Answers Question 1: How do content filters improve computer security? They test URLs in segregated virtual machines (VMs) to see what they do. They prevent denial-of-service (DoS) attacks. They block lewd websites. They block adware, spam, and malware. Question 2: Which three filters are examples …
Read More »Fortinet Getting Started in Cybersecurity Secure Email Gateway Quiz Answers
Lesson 5: Secure Email Gateway Quiz Answers Question 1: Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.) Click bait An infected thumb drive An embedded hyperlink within an email An attachment to an email Question 2: In addition to a …
Read More »