You are on page 1of 3

The Evolution of Cybersecurity

Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>


Started on
State
Completed on
Time taken
Points 4/5
Grade 80 out of 100
Feedback Congratulations, you passed!

Question 1
Correct
1 points out of 1

m
er as
co
eH w
Flag question

o.
Question text
rs e
ou urc
For which two reasons was the sandbox solution added to network security?
(Choose two.)
Select one or more:
o

Firewalls and AVs were helpless against unknown threats.


aC s
vi y re

AVs were able to stop unknown threats, but firewalls could not.
Firewalls were quite sufficient but better risk management was needed.
Unknown threats needed to be quarantined.
ed d

Question 2
ar stu

Correct
1 points out of 1
is
Th

Flag question

Question text
sh

Which two problems was network security experiencing before the introduction of a
sandbox solution? (Choose two.)
Select one or more:
AVs were not introduced into network security.

This study source was downloaded by 100000790303973 from CourseHero.com on 07-22-2021 12:10:09 GMT -05:00

https://www.coursehero.com/file/60723982/The-Evolution-of-Cybersecurity-Sandboxingdocx/
Network security was unable to handle a coordinated attack using different threat
vectors and methods.
Security devices did not communicate with other security devices on the network.
Firewalls were non-existent.

Question 3
Correct
1 points out of 1

Flag question

Question text

m
er as
What are two characteristics of a sandbox? (Choose two.)

co
Select one or more:

eH w
If something unexpected or malicious happens, it affects only the sandbox.

o.
A sandbox confines the actions of code to the sandbox device and in isolation to the
rest of the network. rs e
ou urc
A sandbox provides full network security.
A sandbox only provides completely independent protection of IOT devices.
o

Question 4
aC s

Correct
vi y re

1 points out of 1
ed d
ar stu

Flag question

Question text
is

What is the purpose of the sandbox?


Th

Select one:
To observe the activity of unknown code in a quarantined environment
sh

To flag and pass the known exploit to the endpoint to handle


To stop all BYOD network traffic
To run vulnerability scans on all network endpoints

Question 5
Incorrect
0 points out of 1

This study source was downloaded by 100000790303973 from CourseHero.com on 07-22-2021 12:10:09 GMT -05:00

https://www.coursehero.com/file/60723982/The-Evolution-of-Cybersecurity-Sandboxingdocx/
Flag question

Question text

How does sandbox solve the problem of aggregating threat intelligence data?
Select one:
By sharing valuable threat intelligence to the security devices on its network
By sharing malicious code with all devices on the network
By executing malicious code in multiple isolated environments
By alerting administrators to threats

m
er as
co
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu
is
Th
sh

This study source was downloaded by 100000790303973 from CourseHero.com on 07-22-2021 12:10:09 GMT -05:00

https://www.coursehero.com/file/60723982/The-Evolution-of-Cybersecurity-Sandboxingdocx/
Powered by TCPDF (www.tcpdf.org)

You might also like