Professional Documents
Culture Documents
Question 1
Correct
1 points out of 1
m
er as
co
eH w
Flag question
o.
Question text
rs e
ou urc
For which two reasons was the sandbox solution added to network security?
(Choose two.)
Select one or more:
o
AVs were able to stop unknown threats, but firewalls could not.
Firewalls were quite sufficient but better risk management was needed.
Unknown threats needed to be quarantined.
ed d
Question 2
ar stu
Correct
1 points out of 1
is
Th
Flag question
Question text
sh
Which two problems was network security experiencing before the introduction of a
sandbox solution? (Choose two.)
Select one or more:
AVs were not introduced into network security.
This study source was downloaded by 100000790303973 from CourseHero.com on 07-22-2021 12:10:09 GMT -05:00
https://www.coursehero.com/file/60723982/The-Evolution-of-Cybersecurity-Sandboxingdocx/
Network security was unable to handle a coordinated attack using different threat
vectors and methods.
Security devices did not communicate with other security devices on the network.
Firewalls were non-existent.
Question 3
Correct
1 points out of 1
Flag question
Question text
m
er as
What are two characteristics of a sandbox? (Choose two.)
co
Select one or more:
eH w
If something unexpected or malicious happens, it affects only the sandbox.
o.
A sandbox confines the actions of code to the sandbox device and in isolation to the
rest of the network. rs e
ou urc
A sandbox provides full network security.
A sandbox only provides completely independent protection of IOT devices.
o
Question 4
aC s
Correct
vi y re
1 points out of 1
ed d
ar stu
Flag question
Question text
is
Select one:
To observe the activity of unknown code in a quarantined environment
sh
Question 5
Incorrect
0 points out of 1
This study source was downloaded by 100000790303973 from CourseHero.com on 07-22-2021 12:10:09 GMT -05:00
https://www.coursehero.com/file/60723982/The-Evolution-of-Cybersecurity-Sandboxingdocx/
Flag question
Question text
How does sandbox solve the problem of aggregating threat intelligence data?
Select one:
By sharing valuable threat intelligence to the security devices on its network
By sharing malicious code with all devices on the network
By executing malicious code in multiple isolated environments
By alerting administrators to threats
m
er as
co
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu
is
Th
sh
This study source was downloaded by 100000790303973 from CourseHero.com on 07-22-2021 12:10:09 GMT -05:00
https://www.coursehero.com/file/60723982/The-Evolution-of-Cybersecurity-Sandboxingdocx/
Powered by TCPDF (www.tcpdf.org)