You are on page 1of 1

 Library Schedule Certifications ATC Academic Partner Program Fast Track Workshops  

 FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced


 FCF - Technical
Introduction to
Cybersecurity 1.0 Self- Started on Tuesday, April 23, 2024, 12:20 AM
Paced State Finished
Completed on Tuesday, April 23, 2024, 12:33 AM
 Dashboard Time taken 12 mins 51 secs
Points 19/20
 Achievements Grade 95 out of 100
Feedback Congratulations, you passed!
 Library

 Schedule Question 1 View the following exhibit:


Correct

1 points out of 1

Flag question


What will be at least checked by the firewall upon receiving the server reply packet?

Select one or more:


The packet five-tuple
The firewall session table
If the implicit firewall policy is set to allow
Nothing when the packet is encrypted

Question 2 What are objectives of Software Defined Wide Area Network (SD-WAN)? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Lower latency
Greater reliability
Increase data protection
Lower Quality of Service (QoS)

Question 3 Which type of attack is handled only by the latest sandbox generation?
Correct

1 points out of 1 Select one:


Flag question Zero-day attacks
Attacks exploiting known vulnerabilities
Fraggle attacks
AI-driven attacks

Question 4 Why would a security architect segment a network? (Choose two.)


Correct

1 points out of 1 Select one or more:


Flag question To facilitate the management access through a connection to each device in the network
To increase the scope of compliance to the complete network
To limit the attacks to the specific segment without contaminating all the network
To reduce the network congestions and broadcasts

Question 5 View the following exhibit:


Correct

1 points out of 1

Flag question

In this SD-WAN environment, what does the red line represent?

Select one:
A Wide Area Network (WAN)
An overlay network
A physical network
An underlay network

Question 6 What are the benefits for a bank in taking a Next Generation FireWall (NGFW) to secure its network? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question An artificial intelligence performs all the security checkpoints.
Malicious content is checked through Deep Packet Inspection (DPI).
Further analysis can be performed with a sandbox.
Machine learning configures automatically micro-segmentation.

Question 7 A security compliance audit must take place. Which implementation can simplify it?
Correct

1 points out of 1 Select one:


Flag question Centralized security management
Simple Network Management Protocol (SNMP)
Application Programming Interface (API)
Artificial Intelligence

Question 8 Which principles are part of the Zero-Trust security model? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Assume that your network is breached
Trust only your Local Area Network (LAN)
Reduce DeMilitarized Zone (DMZ) surface
Implement least privilege

Question 9 Why knowing the source IPs of an attack may not be relevant? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Attackers can use zero-day attacks.
Attackers can use botnets.
Source IPs can be forked.
Source IPs can be spoofed.

Question 10 What was missing in the early sandbox generation? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question A zero-day attacks detection
An isolated environment to test unknown files
An integration with other security devices
Automation and artificial intelligence

Question 11 Which implementation should be done by a security architect to limit network threats in a network? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Centralized network management
Software Defined Wide Area Network (SD-WAN)
Network segmentation
Zero trust

Question 12 Why is Fortinet Security Fabric an example of centralized security network management? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question It can communicate with other devices through Application Programming Interfaces (APIs) or fabric connectors.
It has a broad view of the security with an end to end visibility.
All tasks and configurations are manual.
It can operate only locally.

Question 13 Why may a security architect add a sandbox in a network? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question To detect zero day attacks
To provide authentication
To share threat intelligence with other security devices
To stop known threats like a honeypot

Question 14 When implementing a data fabric architecture, which benefits do you expect? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question The different parts of the security network are linked.
The monitoring and data management is centrally governed.
The authentication is enforced.
The attack surface is reduced.

Question 15 What does Secure Access Service Edge (SASE) offer to remote off-net users compared to on-net?
Correct

1 points out of 1 Select one:


Flag question Real-time analysis of security alerts
Better software upgrades including security patches
The same security policies no matter their location
Different login credentials to access different systems

Question 16 Which challenges brought the evolution from a network model with a single, dedicated service provider to Software Defined
Correct Wide Area Network (SD-WAN)? (Choose two.)
1 points out of 1

Flag question Select one or more:


Demand for more cloud applications and services
Reliability
Data protection
Compliance requirements

Question 17 Which application could provide the list of open ports to a security engineer, so the unnecessary ones can be closed?
Correct

1 points out of 1 Select one:


Flag question Machine Learning
Syslog
Network mapper (nmap)
Sandbox

Question 18 Which required capabilities are included in Secure Access Service Edge (SASE)? (Choose two.)
Incorrect

0 points out of 1 Select one or more:


Flag question Software-as-a-Service 
Security-as-a-Service
Platform-as-a-Service
Network-as-a-Service

Question 19 When implementing Zero-Trust security, which benefits do you expect? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Proofs of trust
Tighter restrictions to access resources
A defined trusted zone
No micro-segmentation

Question 20 Which network is enclosed by the security perimeter?


Correct

1 points out of 1 Select one:


Flag question The Wide Area Network (WAN)
The Local Area Network (LAN) only
The Demilitarized Zone (DMZ)
The trusted network

Start another attempt Back to the course

You are logged in as Paula Monroy (Log out)

You might also like