100% found this document useful (1 vote)
557 views1 page

Quiz - Secure Network - Attempt Review

This document discusses a self-paced technical introduction to cybersecurity course. The course contains 13 multiple choice questions covering topics like firewalls, software defined wide area networks, next generation firewalls, zero trust security, and sandboxing.

Uploaded by

lita941227
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
557 views1 page

Quiz - Secure Network - Attempt Review

This document discusses a self-paced technical introduction to cybersecurity course. The course contains 13 multiple choice questions covering topics like firewalls, software defined wide area networks, next generation firewalls, zero trust security, and sandboxing.

Uploaded by

lita941227
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

 Library Schedule Certifications ATC Academic Partner Program Fast Track Workshops  

 FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced


 FCF - Technical
Introduction to
Cybersecurity 1.0 Self- Started on Tuesday, April 23, 2024, 12:20 AM
Paced State Finished
Completed on Tuesday, April 23, 2024, 12:33 AM
 Dashboard Time taken 12 mins 51 secs
Points 19/20
 Achievements Grade 95 out of 100
Feedback Congratulations, you passed!
 Library

 Schedule Question 1 View the following exhibit:


Correct

1 points out of 1

Flag question


What will be at least checked by the firewall upon receiving the server reply packet?

Select one or more:


The packet five-tuple
The firewall session table
If the implicit firewall policy is set to allow
Nothing when the packet is encrypted

Question 2 What are objectives of Software Defined Wide Area Network (SD-WAN)? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Lower latency
Greater reliability
Increase data protection
Lower Quality of Service (QoS)

Question 3 Which type of attack is handled only by the latest sandbox generation?
Correct

1 points out of 1 Select one:


Flag question Zero-day attacks
Attacks exploiting known vulnerabilities
Fraggle attacks
AI-driven attacks

Question 4 Why would a security architect segment a network? (Choose two.)


Correct

1 points out of 1 Select one or more:


Flag question To facilitate the management access through a connection to each device in the network
To increase the scope of compliance to the complete network
To limit the attacks to the specific segment without contaminating all the network
To reduce the network congestions and broadcasts

Question 5 View the following exhibit:


Correct

1 points out of 1

Flag question

In this SD-WAN environment, what does the red line represent?

Select one:
A Wide Area Network (WAN)
An overlay network
A physical network
An underlay network

Question 6 What are the benefits for a bank in taking a Next Generation FireWall (NGFW) to secure its network? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question An artificial intelligence performs all the security checkpoints.
Malicious content is checked through Deep Packet Inspection (DPI).
Further analysis can be performed with a sandbox.
Machine learning configures automatically micro-segmentation.

Question 7 A security compliance audit must take place. Which implementation can simplify it?
Correct

1 points out of 1 Select one:


Flag question Centralized security management
Simple Network Management Protocol (SNMP)
Application Programming Interface (API)
Artificial Intelligence

Question 8 Which principles are part of the Zero-Trust security model? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Assume that your network is breached
Trust only your Local Area Network (LAN)
Reduce DeMilitarized Zone (DMZ) surface
Implement least privilege

Question 9 Why knowing the source IPs of an attack may not be relevant? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Attackers can use zero-day attacks.
Attackers can use botnets.
Source IPs can be forked.
Source IPs can be spoofed.

Question 10 What was missing in the early sandbox generation? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question A zero-day attacks detection
An isolated environment to test unknown files
An integration with other security devices
Automation and artificial intelligence

Question 11 Which implementation should be done by a security architect to limit network threats in a network? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Centralized network management
Software Defined Wide Area Network (SD-WAN)
Network segmentation
Zero trust

Question 12 Why is Fortinet Security Fabric an example of centralized security network management? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question It can communicate with other devices through Application Programming Interfaces (APIs) or fabric connectors.
It has a broad view of the security with an end to end visibility.
All tasks and configurations are manual.
It can operate only locally.

Question 13 Why may a security architect add a sandbox in a network? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question To detect zero day attacks
To provide authentication
To share threat intelligence with other security devices
To stop known threats like a honeypot

Question 14 When implementing a data fabric architecture, which benefits do you expect? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question The different parts of the security network are linked.
The monitoring and data management is centrally governed.
The authentication is enforced.
The attack surface is reduced.

Question 15 What does Secure Access Service Edge (SASE) offer to remote off-net users compared to on-net?
Correct

1 points out of 1 Select one:


Flag question Real-time analysis of security alerts
Better software upgrades including security patches
The same security policies no matter their location
Different login credentials to access different systems

Question 16 Which challenges brought the evolution from a network model with a single, dedicated service provider to Software Defined
Correct Wide Area Network (SD-WAN)? (Choose two.)
1 points out of 1

Flag question Select one or more:


Demand for more cloud applications and services
Reliability
Data protection
Compliance requirements

Question 17 Which application could provide the list of open ports to a security engineer, so the unnecessary ones can be closed?
Correct

1 points out of 1 Select one:


Flag question Machine Learning
Syslog
Network mapper (nmap)
Sandbox

Question 18 Which required capabilities are included in Secure Access Service Edge (SASE)? (Choose two.)
Incorrect

0 points out of 1 Select one or more:


Flag question Software-as-a-Service 
Security-as-a-Service
Platform-as-a-Service
Network-as-a-Service

Question 19 When implementing Zero-Trust security, which benefits do you expect? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Proofs of trust
Tighter restrictions to access resources
A defined trusted zone
No micro-segmentation

Question 20 Which network is enclosed by the security perimeter?


Correct

1 points out of 1 Select one:


Flag question The Wide Area Network (WAN)
The Local Area Network (LAN) only
The Demilitarized Zone (DMZ)
The trusted network

Start another attempt Back to the course

You are logged in as Paula Monroy (Log out)

You might also like