Home Fortinet Sandbox Quiz Answer NSE 2 Information Security Awareness Fortinet

Sandbox Quiz Answer NSE 2 Information Security Awareness Fortinet


Question 1: Which two problems was network security experiencing before the introduction of a sandbox solution? (Choose two.)

  • Network security was unable to handle a coordinated attack using different threat vectors and methods.
  • AVs were not introduced into network security.
  • Security devices did not communicate with other security devices on the network.
  • Firewalls were non-existent.

Question 2: For which two reasons was the sandbox solution added to network security? (Choose two.)

  • Firewalls were quite sufficient but better risk management was needed.
  • Firewalls and AVs were helpless against unknown threats.
  • Unknown threats needed to be quarantined.
  • AVs were able to stop unknown threats, but firewalls could not.

Question 3: How does sandbox solve the problem of aggregating threat intelligence data?

  • By sharing malicious code with all devices on the network
  • By sharing valuable threat intelligence to the security devices on its network
  • By alerting administrators to threats
  • By executing malicious code in multiple isolated environments

Question 4: What are two characteristics of a sandbox? (Choose two.)

  • A sandbox only provides completely independent protection of IOT devices.
  • If something unexpected or malicious happens, it affects only the sandbox.
  • A sandbox provides full network security.
  • A sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network.

Question 5: Which two business problems is FortiSandbox trying to solve? (Choose two.)

  • Nonexistent or inadequate firewall protection
  • Insufficient fine-tuning of network performance
  • The choice of performance over security by businesses
  • The potential to exploit OS or application weaknesses with malignant code

Question 6: What is the purpose of the sandbox?

  • To stop all BYOD network traffic
  • To flag and pass the known exploit to the endpoint to handle
  • To observe the activity of unknown code in a quarantined environment
  • To run vulnerability scans on all network endpoints

Question 7: What is a zero-day attack?

  • Exploiting a vulnerability scanner
  • Vulnerability scanning from the zero-day
  • Exploiting only zero-day configured firewalls.
  • Exploiting an unknown deficiency in code.

Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning?
Select one:

  • AI-driven attacks*
  • Trojan horse
  • Ransomware
  • Polymorphic viruses

Which feature in early networks made aggregating threat intelligence difficult?
Select one:

  • Hybrid cloud environments
  • Virtualization
  • Segmentation
  • Point solutions

Which failing characterized early sandbox technology?
Select one:

  • Could not stop zero-day attacks/
  • Failed to categorize malware/
  • Lack of integration with other security devices
  • Slowed network traffic

Within the computer security context, what is a sandbox?
Select one:

  • An isolated virtual environment to test suspicious files and hyperlinks*
  • A process used to identify, describe, and categorize malware
  • A service in the Cloud used to collect and share threat intelligence
  • A segment of the network reserved for testing unknown programs

Which feature characterizes third-generation sandbox technology?
Select one:

  • Scanning of encrypted data streams
  • Streamlines manual testing
  • Automation and artificial intelligence
  • Faster network speeds

What was a benefit of second generation sandbox technology?
Select one:

  • Scanning of encrypted data streams
  • Automation and artificial intelligence (AI)
  • Faster network speeds
  • Timely sharing of threat intelligence


Please enter your comment!
Please enter your name here