Question 1: Which two problems was network security experiencing before the introduction of a sandbox solution? (Choose two.)
- Network security was unable to handle a coordinated attack using different threat vectors and methods.
- AVs were not introduced into network security.
- Security devices did not communicate with other security devices on the network.
- Firewalls were non-existent.
Question 2: For which two reasons was the sandbox solution added to network security? (Choose two.)
- Firewalls were quite sufficient but better risk management was needed.
- Firewalls and AVs were helpless against unknown threats.
- Unknown threats needed to be quarantined.
- AVs were able to stop unknown threats, but firewalls could not.
Question 3: How does sandbox solve the problem of aggregating threat intelligence data?
- By sharing malicious code with all devices on the network
- By sharing valuable threat intelligence to the security devices on its network
- By alerting administrators to threats
- By executing malicious code in multiple isolated environments
Question 4: What are two characteristics of a sandbox? (Choose two.)
- A sandbox only provides completely independent protection of IOT devices.
- If something unexpected or malicious happens, it affects only the sandbox.
- A sandbox provides full network security.
- A sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network.
Question 5: Which two business problems is FortiSandbox trying to solve? (Choose two.)
- Nonexistent or inadequate firewall protection
- Insufficient fine-tuning of network performance
- The choice of performance over security by businesses
- The potential to exploit OS or application weaknesses with malignant code
Question 6: What is the purpose of the sandbox?
- To stop all BYOD network traffic
- To flag and pass the known exploit to the endpoint to handle
- To observe the activity of unknown code in a quarantined environment
- To run vulnerability scans on all network endpoints
Question 7: What is a zero-day attack?
- Exploiting a vulnerability scanner
- Vulnerability scanning from the zero-day
- Exploiting only zero-day configured firewalls.
- Exploiting an unknown deficiency in code.
Question 8: Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning?
Select one:
- AI-driven attacks*
- Trojan horse
- Ransomware
- Polymorphic viruses
Question 9: Which feature in early networks made aggregating threat intelligence difficult?
Select one:
- Hybrid cloud environments
- Virtualization
- Segmentation
- Point solutions
Question 10: Which failing characterized early sandbox technology?
Select one:
- Could not stop zero-day attacks/
- Failed to categorize malware/
- Lack of integration with other security devices
- Slowed network traffic
Question 11: Within the computer security context, what is a sandbox?
Select one:
- An isolated virtual environment to test suspicious files and hyperlinks*
- A process used to identify, describe, and categorize malware
- A service in the Cloud used to collect and share threat intelligence
- A segment of the network reserved for testing unknown programs
Question 12: Which feature characterizes third-generation sandbox technology?
Select one:
- Scanning of encrypted data streams
- Streamlines manual testing
- Automation and artificial intelligence
- Faster network speeds
Question 13: What was a benefit of second generation sandbox technology?
Select one:
- Scanning of encrypted data streams
- Automation and artificial intelligence (AI)
- Faster network speeds
- Timely sharing of threat intelligence