Question 1: Which two problems was network security experiencing before the introduction of a sandbox solution? (Choose two.)
- Network security was unable to handle a coordinated attack using different threat vectors and methods.
- AVs were not introduced into network security.
- Security devices did not communicate with other security devices on the network.
- Firewalls were non-existent.
Question 2: For which two reasons was the sandbox solution added to network security? (Choose two.)
- Firewalls were quite sufficient but better risk management was needed.
- Firewalls and AVs were helpless against unknown threats.
- Unknown threats needed to be quarantined.
- AVs were able to stop unknown threats, but firewalls could not.
Question 3: How does sandbox solve the problem of aggregating threat intelligence data?
- By sharing malicious code with all devices on the network
- By sharing valuable threat intelligence to the security devices on its network
- By alerting administrators to threats
- By executing malicious code in multiple isolated environments
Question 4: What are two characteristics of a sandbox? (Choose two.)
- A sandbox only provides completely independent protection of IOT devices.
- If something unexpected or malicious happens, it affects only the sandbox.
- A sandbox provides full network security.
- A sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network.
Question 5: Which two business problems is FortiSandbox trying to solve? (Choose two.)
- Nonexistent or inadequate firewall protection
- Insufficient fine-tuning of network performance
- The choice of performance over security by businesses
- The potential to exploit OS or application weaknesses with malignant code
Question 6: What is the purpose of the sandbox?
- To stop all BYOD network traffic
- To flag and pass the known exploit to the endpoint to handle
- To observe the activity of unknown code in a quarantined environment
- To run vulnerability scans on all network endpoints
Question 7: What is a zero-day attack?
- Exploiting a vulnerability scanner
- Vulnerability scanning from the zero-day
- Exploiting only zero-day configured firewalls.
- Exploiting an unknown deficiency in code.