Lesson 10: SOAR Quiz Answers Question 1: What is a common use case for an implementation of SOAR by customers? Guarding against DoS attacks Detecting zero-day attacks Phishing investigations Logging events and alerts Question 2: Which statement best describes SOAR? SOAR collects logs from all security tools to improve network …
Read More »Fortinet Getting Started in Cybersecurity Endpoint Monitoring Quiz Answers
Lesson 9: Endpoint Monitoring Quiz Answers Question 1: Which three strategies help secure unknown endpoints? (Choose three.) Configure network security devices to prevent unauthorized devices from accessing the network Enforce the principle of least privilege Upgrade antivirus software on all known network devices Force devices onto an isolated network until …
Read More »Fortinet Getting Started in Cybersecurity Endpoint Hardening Techniques Quiz Answers
Lesson 8: Endpoint Hardening Techniques Quiz Answers Question 1: Which hardening endpoint category does the principle of least privilege belong to? Endpoint monitoring Administrative controls Endpoint maintenance Local endpoint protection Question 2: Which two techniques can prevent access to information on stolen portable devices? (Choose two.) Encrypt the data stored …
Read More »Fortinet Getting Started in Cybersecurity Wi-Fi Quiz Answers
Lesson 7: Wi-Fi Quiz Answers Question 1: What is Wi-Fi? Fiber that makes wireless technology possible Quality audio technology An Ethernet networking protocol Technology for radio wireless local area networks Question 2: Which two security practices make your home wireless network safer? (Choose two.) Consult with NIST as to the …
Read More »Fortinet Getting Started in Cybersecurity Content Filters Quiz Answers
Lesson 6: Content Filters Quiz Answers Question 1: How do content filters improve computer security? They test URLs in segregated virtual machines (VMs) to see what they do. They prevent denial-of-service (DoS) attacks. They block lewd websites. They block adware, spam, and malware. Question 2: Which three filters are examples …
Read More »Fortinet Getting Started in Cybersecurity Secure Email Gateway Quiz Answers
Lesson 5: Secure Email Gateway Quiz Answers Question 1: Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.) Click bait An infected thumb drive An embedded hyperlink within an email An attachment to an email Question 2: In addition to a …
Read More »Fortinet Getting Started in Cybersecurity WAF Quiz Answers
Lesson 4: WAF Quiz Answers Question 1: Which three features are characteristics of the latest generation WAF? (Choose three.) IP reputation DDoS defense SPU Network segmentation DLP Question 2: Which firewall is positioned between a web application and the Internet? Edge firewall Segmentation firewall Packet filter firewall Web application firewall …
Read More »Fortinet Getting Started in Cybersecurity Sandbox Quiz Answers
Lesson 3: Sandbox Quiz Answers Question 1: What is a zero-day attack? A computer virus that receives instructions from a Command and Control server A new and unknown computer virus Malware that converts all data bits to zeros A cyberattack that exploits an unknown software vulnerability Question 2: Which failing …
Read More »Fortinet Getting Started in Cybersecurity Network Access Control Quiz Answers
Lesson 2: Network Access Control Quiz Answers Question 1: How does NAC effectively segment a network? Utilizing device profiles Using user roles Using IP addresses Routers Question 2: Which security challenge do BYODs pose to networks? Limited RAM prevents the installation of security software MIS does not control what is …
Read More »Fortinet Getting Started in Cybersecurity Firewalls Quiz Answers
Lesson 1: Firewalls Quiz Answers Question 1: Which type of firewall was the first generation of firewalls? Packet filter Application layer Next-generation firewall (NGFW) Stateful Question 2: Complete the sentence: A packet filter firewall controls network traffic based on ___________. network addresses, protocols, and ports. the behavior of the network …
Read More »
Priya Dogra – Certification | Jobs | Internships