Professional Documents
Culture Documents
FortiDeceptor - 3 - FIJAS
FortiDeceptor - 3 - FIJAS
Correct
1 points out of 1
Flag question
Question text
Which three vendors in the deception technology space are Fortinet’s main? (Choose
three.)
Select one or more:
Attivo
Checkpoint
Cisco
Trapx
Illusive Networks
Question 8
Correct
1 points out of 1
Flag question
Question text
Which statement correctly identifies the approach to defending the network with
FortiDeceptor?
Select one:
Blocks IP addresses and URLs that are identified on blacklists.
Defends against bulk volumetric attacks at layer 3 and layer 4 of the OSI model.
Reports and enforces compliance of regulations, such as HIPAA and GDPR.
Builds decoys to lure attackers and inspects their behaviour.
Started on Wednesday, February 26, 2020, 5:25 PM
State Finished
Completed on Wednesday, February 26, 2020, 5:33 PM
Time taken 8 mins 3 secs
Points 10/10
Grade 100 out of 100
Feedback Congratulations, you have passed!
Question 1
Correct
1 points out of 1
Flag question
Question text
Which question might be appropriate to ask at a customer site in order to discover more
about the customer’s situation and requirements?
Select one:
Have the breaches reported in the news concerned you?
How much have you been able to automate the investigation and the remediation of
a network breach?
How are you currently analysing the logs related with security events?
Are you looking for a central management solution for your network?
Question 2
Correct
1 points out of 1
Flag question
Question text
Which two reasons explain why organizations fail to discover network breaches sooner?
(Choose two.)
Select one or more:
The leadership of organizations neither fund network security sufficiently nor take
it seriously.
SOC specialists respond slowly or not at all to network breaches.
Security Ops Centers are often under staffed due to a shortage of Information
Security talent.
The many point products that comprise the security architecture cannot always
integrate sufficiently to share threat intelligence.
Question 3
Correct
1 points out of 1
Flag question
Question text
Question 4
Correct
1 points out of 1
Flag question
Question text
Question 5
Correct
1 points out of 1
Flag question
Question text
Which Fortinet product or service provides FortiDeceptor with antivirus, web filtering
and IPS detection services?
Select one:
FortiSandbox
FortiGuard
FortiAnalyzer
FortiSIEM
Question 6
Correct
1 points out of 1
Flag question
Question text
Question 7
Correct
1 points out of 1
Flag question
Question text
With respect to network breaches, which statement correctly describes a business driver
for FortiDeceptor?
Select one:
The majority of network breaches take months to discover.
Network breaches have dramatically declined over the last several years.
Most of the network breaches are inside jobs.
The initial compromise of an asset from a breach and subsequent exfiltration takes
months to occur.
Question 8
Correct
1 points out of 1
Flag question
Question text
Question 9
Correct
1 points out of 1
Flag question
Question text
What might be three good responses to a customer who says, “My current security
solutions are allowing me to detect unknown threats.”? (Choose three.)
Select one or more:
FortiDeceptor allows you to stand up 256 decoys and 16 VMs on Linux and
Windows.
Deception provides accurate actionable intelligence since it traps attackers and not
authentic users.
Most ATP solutions react to threats, but deception proactively redirects attacks.
FortiDeceptor automates threat response to an attack before any real damage is
done.
Most of the traditional advanced security analytics do not detect most of the known
threat.
Question 10
Correct
1 points out of 1
Flag question
Question text
Which statement is the best response to this customer’s objection: “Why should I
consider Fortinet over other deception offerings?”?
Select one:
FortiDeceptor analyzes security-event logs to automatically take preventive actions.
Decoys and deception VMs can cover the entire organization, from branch
locations, to the campus, data center, and cloud.
Unlike Fortinet, many of the other vendors cannot offer global follow-the-sun
support, product longevity, and roadmap commitments.
Deception offers accurate intelligence that your SOC team can act upon.