You are on page 1of 7

Question 4

Correct
1 points out of 1

Flag question

Question text

Which three vendors in the deception technology space are Fortinet’s main? (Choose
three.)
Select one or more:
Attivo
Checkpoint
Cisco
Trapx
Illusive Networks

Question 8

Correct
1 points out of 1

Flag question

Question text

Which statement correctly identifies the approach to defending the network with
FortiDeceptor?
Select one:
Blocks IP addresses and URLs that are identified on blacklists.
Defends against bulk volumetric attacks at layer 3 and layer 4 of the OSI model.
Reports and enforces compliance of regulations, such as HIPAA and GDPR.
Builds decoys to lure attackers and inspects their behaviour.
Started on Wednesday, February 26, 2020, 5:25 PM
State Finished
Completed on Wednesday, February 26, 2020, 5:33 PM
Time taken 8 mins 3 secs
Points 10/10
Grade 100 out of 100
Feedback Congratulations, you have passed!

Question 1

Correct
1 points out of 1

Flag question

Question text

Which question might be appropriate to ask at a customer site in order to discover more
about the customer’s situation and requirements?
Select one:
Have the breaches reported in the news concerned you?
How much have you been able to automate the investigation and the remediation of
a network breach?
How are you currently analysing the logs related with security events?
Are you looking for a central management solution for your network?

Question 2

Correct
1 points out of 1

Flag question

Question text

Which two reasons explain why organizations fail to discover network breaches sooner?
(Choose two.)
Select one or more:
The leadership of organizations neither fund network security sufficiently nor take
it seriously.
SOC specialists respond slowly or not at all to network breaches.
Security Ops Centers are often under staffed due to a shortage of Information
Security talent.
The many point products that comprise the security architecture cannot always
integrate sufficiently to share threat intelligence.

Question 3

Correct
1 points out of 1

Flag question

Question text

According to Gartner’s Hype Cycle, at what stage in market development is deception


technology?
Select one:
Slope of Enlightenment
Innovation or early
Peak
Terminal

Question 4

Correct
1 points out of 1

Flag question

Question text

Which three FortiDeceptor product characteristics highlight the solution’s flexibility?


(Choose three.)
Select one or more:
Offers a single point of management for all your security devices.
Deception VMs can simulate both Linux and Windows-based operating systems.
Correlates, analyzes, and reports on compliance issues.
Decoys and deception VMs can cover the entire organization, from branch
locations, to the campus, data center, and cloud.
Can be deployed on premise or in the public cloud.

Question 5

Correct
1 points out of 1

Flag question

Question text

Which Fortinet product or service provides FortiDeceptor with antivirus, web filtering
and IPS detection services?
Select one:
FortiSandbox
FortiGuard
FortiAnalyzer
FortiSIEM

Question 6

Correct
1 points out of 1

Flag question

Question text

What is the FortiDeceptor lifecycle?


Select one:
Deceive > Expose > Eliminate
Detect > Expose > Protect
Detect > Contain > Eliminate
Deceive > Contain > Protect

Question 7

Correct
1 points out of 1

Flag question

Question text

With respect to network breaches, which statement correctly describes a business driver
for FortiDeceptor?
Select one:
The majority of network breaches take months to discover.
Network breaches have dramatically declined over the last several years.
Most of the network breaches are inside jobs.
The initial compromise of an asset from a breach and subsequent exfiltration takes
months to occur.

Question 8

Correct
1 points out of 1

Flag question

Question text

With which Fortinet products does FortiDeceptor integrate?


Select one:
FortiGate, FortiSIEM, and FortiAnalyzer
FortiGate, FortiSandbox, and the Security Fabric
FortiGate, FortiAnalyzer, and FortiManager
FortiGate and FortiCloud

Question 9
Correct
1 points out of 1

Flag question

Question text

What might be three good responses to a customer who says, “My current security
solutions are allowing me to detect unknown threats.”? (Choose three.)
Select one or more:
FortiDeceptor allows you to stand up 256 decoys and 16 VMs on Linux and
Windows.
Deception provides accurate actionable intelligence since it traps attackers and not
authentic users.
Most ATP solutions react to threats, but deception proactively redirects attacks.
FortiDeceptor automates threat response to an attack before any real damage is
done.
Most of the traditional advanced security analytics do not detect most of the known
threat.

Question 10

Correct
1 points out of 1

Flag question

Question text

Which statement is the best response to this customer’s objection: “Why should I
consider Fortinet over other deception offerings?”?
Select one:
FortiDeceptor analyzes security-event logs to automatically take preventive actions.
Decoys and deception VMs can cover the entire organization, from branch
locations, to the campus, data center, and cloud.
Unlike Fortinet, many of the other vendors cannot offer global follow-the-sun
support, product longevity, and roadmap commitments.
Deception offers accurate intelligence that your SOC team can act upon.

You might also like