Lesson 3: Sandbox Quiz Answers
Question 1: What is a zero-day attack?
- A computer virus that receives instructions from a Command and Control server
- A new and unknown computer virus
- Malware that converts all data bits to zeros
- A cyberattack that exploits an unknown software vulnerability
Question 2: Which failing characterized early sandbox technology?
- Lack of integration with other security devices
- Could not stop zero-day attacks
- Slowed network traffic
- Failed to categorize malware
Question 3: Which feature in early networks made aggregating threat intelligence difficult?
- Virtualization
- Segmentation
- Hybrid cloud environments
- Point solutions
Question 4: Which feature characterizes third-generation sandbox technology?
- Scanning of encrypted data streams
- Faster network speeds
- Streamlines manual testing
- Automation and artificial intelligence
Question 5: What was a benefit of second generation sandbox technology?
- Automation and artificial intelligence (AI)
- Scanning of encrypted data streams
- Faster network speeds
- Timely sharing of threat intelligence
Question 6: Within the computer security context, what is a sandbox?
- A service in the Cloud used to collect and share threat intelligence
- A segment of the network reserved for testing unknown programs
- A process used to identify, describe, and categorize malware
- An isolated virtual environment to test suspicious files and hyperlinks
Question 7: Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning?
- Polymorphic viruses
- Ransomware
- Trojan horse
- AI-driven attacks