Kategori arşivi: Network

Network cihazları hakkında temel yapılandırmalar, IPS ve IDS cihaz kurulumları ve yapılandırma örnekleri, fortigate, palo alto firewall yapılandırma, sorunlar ve çözümleri hakkında türkçe yazılar

Fortinet NSE 2 – Ders 8(Sandbox) Cevaplar

Soru 1: For which two reasons was the sandbox solution added to network security? (Choose two.)

AVs were able to stop unknown threats, but firewalls could not.
Firewalls and AVs were helpless against unknown threats.
Unknown threats needed to be quarantined.
Firewalls were quite sufficient but better risk management was needed.

Soru 2: What is the purpose of the sandbox?

To stop all BYOD network traffic
To flag and pass the known exploit to the endpoint to handle
To observe the activity of unknown code in a quarantined environment
To run vulnerability scans on all network endpoints

Soru 3: Which two business problems is FortiSandbox trying to solve? (Choose two.)

Nonexistent or inadequate firewall protection
The choice of performance over security by businesses
The potential to exploit OS or application weaknesses with malignant code
Insufficient fine-tuning of network performance

Soru 4: What are two characteristics of a sandbox? (Choose two.)

A sandbox only provides completely independent protection of IOT devices.
If something unexpected or malicious happens, it affects only the sandbox.
A sandbox provides full network security.
A sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network.

Soru 5: Which two problems was network security experiencing before the introduction of a sandbox solution? (Choose two.)

Network security was unable to handle a coordinated attack using different threat vectors and methods.
AVs were not introduced into network security.
Firewalls were non-existent.
Security devices did not communicate with other security devices on the network.

Fortinet NSE 2 – Ders 7(Network Access Control) Cevaplar

Soru 1: What is one characteristic of headless devices?

Devices that provide only centralized architecture
Devices that are connected only to a wired network
Devices that cannot take a 3rd party security agent
Devices that have only AV software installed

Soru 2: What two security challenges do IoT devices present to IT security professionals? (Choose two.)

They often do not support security programs.
They are time consuming to deploy.
They can be exploited by bad actors.
They are frequently stolen.

Soru 3: What is one shortcoming of NAC solutions?

NAC solutions support only endpoint security.
Some NAC solutions underperform in wired environments, creating a security vulnerability.
NAC solutions do not support IoT devices.
NAC solutions do not support BYOD environments.

Soru 4: Which two network security concerns have grown dramatically for businesses in recent years? (Choose two.)

Malware protection requirements
Need for overall network visibility
IoT devices connecting to a network
Need for AVs

Soru 5: What are the three key activities performed by NAC? (Choose three.)

Profile all devices to identify what access they should have
Provide appropriate network access to devices
Watch for IoT devices to respond to CNC servers in the Internet
Discover all devices on the network

Fortinet NSE 2 – Ders 6(Firewall) Cevaplar

Soru 1: What is Fortinet’s range of next-generation firewall devices called? 

FortiGate
FortiBlocker
FortiFirewall
FortiGuard

Soru 2: What works closely with FortiGate next-generation firewall products to provide the highest level of network security?

NSS Labs
FortiGuard Labs
Gartner
RFCs

Soru 3: What three key, additional security features do next-generation firewalls provide, that legacy firewalls do not? (Choose three.)

Web application firewall
Application visibility and control
Intrusion prevention system (IPS)
Packet-filtering based on IP address

Soru 4: With the explosion of the World Wide Web, the composition of network protocols skewed heavily towards HTTP. What challenge did this shift pose to legacy firewalls?

Firewalls did not have visibility into HTTP ports.
HTTP request methods were too complex and diverse.
Different web applications used the same HTTP port number, making it difficult for firewalls to distinguish between applications.
HTTP was an application layer protocol that relied heavily on TCP.

Soru 5: What additional functionality did second generation firewalls provide that early packet filter firewalls did not?

They observed network connections over time and continuously examined conversations between endpoints.
They examined packet headers to detect if the packet contained viruses.
They looked up the IP address of the sender to determine if the source was on a suspect network.
They were stateless firewalls that allowed rogue packets that did not belong to an existing connection to pass through the firewall.

Fortinet NSE 2 – Ders 5(Threat Intelligence Services) Cevaplar

Soru 1: The threat intelligence service catalogs data about existing or emerging attacks, including the specific mechanisms of the attack, and evidence that the attack has happened.
 
What is this data also known as?

Machine learning
Sandboxing
Artificial intelligence
Indicators of compromise
Intelligence catalogs

Soru 2: Which are three functions of sandboxing? (Choose three.)

Sandboxes can send the details to the vendor’s threat intelligence service so that the details can be shared worldwide.
Sandboxing products take a suspect file and places it in an environment where its behaviors can be closely analyzed.
After some time, if nothing malicious is detected in the quarantined files, the sandbox declares them as safe and releases them from quarantine.
Depending on the configuration, the owner of the sandbox can propagate this new knowledge across their network security environment.
Sandboxing quarantines suspicious files and immediately flags them as malware.

Soru 3: What happens when each known malware file is represented by a one-to-one signature approach?

There are more vendor organizations that are able to keep up with the increasing number of malware files.
Malware-as-a-service organizations provide do-it-yourself malware kits as a solution.
The malware count increases daily, however it can be detected early by a one-to-one signature approach.
The variations of malware are easily detected thanks to the affordability of malware kits.
It does not scale well, because the number of malware files increases by millions or more each day.

Soru 4: In the early days of threat intelligence service, in which three timeframes were vendor updates released? (Choose three.)

Every week
Quarterly
Once a year
Monthly

Twice a year

Soru 5: Which statement about cyber-attacks is true?

Sharing intelligence among security vendors is the best way to fight threats.
It is important that individuals become more aware of and knowledgeable about any attacks.
Security products and threat intelligence services that can act together in real time stand the best chance of stopping these attacks.
As bad actors continue to evolve it is important to invest in expensive security products.
There is no secrecy within security vendors and all information is shared.

Fortinet NSE 2 – Ders 4(Endpoint) Cevaplar

Soru 1: Which method did early antivirus products use to detect malware?

They compared the signature of the file with a list of known virus signatures.
They searched for the word “virus” in the contents of the file.
They compared the name of the file with a list of known virus names.
They searched for the word “virus” in the file name.

Soru 2: What were early endpoint security products known as?

Disk or Data recovery tools
Sandboxes
Antivirus software
Floppy disks

Soru 3: How did the rise of the Internet affect the rate at which new malware variants appear?

The rate decreased
The rate increased tremendously
The rate increased slightly
The rate stayed the same

Soru 4: Which device is not considered an endpoint device?

Smartphone
IoT device
Laptop
Ethernet switch

Soru 5: In addition to existing, known threats, what other types of threats must modern endpoint solutions detect?

Network latency or network traffic analysis
Unknown threats
Hard drive crashes
Wi-Fi interference

Fortinet NSE 2 – Ders 3(SD-WAN) Cevaplar

Soru 1: What are two advantages of having integrated security and SD-WAN in a single appliance? (Choose two.)

Needs additional security device for inspection
Backhauls all traffic to the data center for inspection
Provides application control for encrypted traffic
Allows all incoming traffic without inspection
Provides secure direct Internet access

Soru 2: In which two ways does FortiGate solve security issues with SD-WAN? (Choose two.)

Integrates with FortiSandbox and provides SSL inspection
Does not support user authentication and malware detection
Supports basic network firewall only
Includes application control, URL filtering, IPS

Soru 3: What are three major weaknesses of the traditional network that SD-WAN solves? (Choose three.)

Resolves device and user identification
Reduces network downtime
Reduces application latency
Backhauls all traffic to the data center
Provides direct internet access to SaaS applications

Soru 4: Which Fortinet product provides both SD-WAN and NGFW security?

FortiAP
FortiSwitch
FortiSandbox
FortiGate

Soru 5: What are two attributes of an SD-WAN network? (Choose two.)

Risks application failure due to dedicated link
Augments MPLS with affordable broadband connections
Simplifies with zero-touch provisioning and centralized control
Has no application visibility

Fortinet NSE 2 – Ders 2(Cloud Security) Cevaplar

Soru 1: What is SaaS?

A virtualized application environment in the cloud
A type of cloud computing providing a virtualized infrastructure
A security solution for cloud computing
A type of mainframe computing

Soru 2: What drove organizations to move from the traditional network architecture to the cloud?

The cloud can make network security more complicated.
The cloud allows you to move data centers and other services to a third-party network.
The cloud can double the throughput of network devices.
The cloud allows for potential cost savings, and moves costs from capital to operational budgets.

Soru 3: Which three cloud service vendors does the Fortinet Security Fabric integrate with? (Choose three.)

VMware ESXi
SAP
AWS
Google Cloud
Azure

Soru 4: When a customer’s data and services are moved to the cloud, who is ultimately responsible for the security of the data?

The customer
The cloud provider
The device provider
The Internet service provider

Soru 5: What is cloud computing?

The practice of connecting various computers and other network devices together using hubs, switches, and routers.
The practice of using in-house servers with high speed Internet links.
A collection of computers interconnected through virtual private networks.
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data.

Fortinet NSE 2 – Ders 1(SOAR) Cevaplar

Soru 1: What are playbooks used for?

The plan an analyst creates to complete a task manually.
To automate actions an analyst typically would have to complete manually.
To optimize manual processes.
To describe the order analyst’s complete tasks.

Soru 2: What is alert fatigue?

When the number of alerts decline.
When an analyst is overwhelmed from the number of alerts coming in.
When a team reduces the number of alerts coming in using SOAR.
When a SOAR solution is overloaded with alerts.

Soru 3: What does the acronym SOAR stand for?

Security, Orchestration, Automation, & Response
Situation, Opportunity, Action, & Result
Single out, On the board, Asked, & Repeated
Situation, Orientation, Adroit, & Replication

Soru 4: Why is SOAR used?

To collaborate with other analysts during investigations.
To synchronize tools, accelerate response times, reduce alert fatigue, and compensate for the skill shortage gap.
To replace tier 1 analysts and automate all of their tasks.
To analyze workload, organize an analysts tasks, and allow teams to respond using their own processes.

Soru 5: Identify a benefit of SOAR.

Reports on all endpoints that require patching.
Elevates the security team’s sense of success.
Analyzes and generates a security score to better measure improvements in network security.
Increases your security teams efficiency by automating repetitive manual processes.

Fortinet NSE 1 – Ders 5(Personal Security Awareness) Cevaplar

Soru 1: What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to disclose sensitive information or click on a link?

Trojan
Phishing
Malware
Virus

Soru 2: Why is it a security problem if you use the same password for all the systems and websites you use?

If the bad guys break into one of them, they have your password for all of them.
There will be uneven wear on your keyboard.
It increases the difficulty of brute force password attacks.
The bad guys will give up too easily.

Soru 3: Two-factor authentication uses the combination of “something you know” with which other element?

Something you will never know.
Something you want.
Something you have forgotten.
Something you have.

Soru 4: If a vendor or website offers two-factor authentication, what is the recommended action?

Wait for everyone else to do it.
Immediately reboot your computer.
Politely decline.
Enable and use two-factor authentication.

Soru 5: What is the recommendation for passwords on all the systems and websites that you use?

Use “123456” as your password on all systems and websites.
Use different passwords for each system or website.
Use the same password for each system or website.
Never change your passwords.

Soru 6: What percentage of malware is distributed by email?

10%
99%
5%
Over 50%

Soru 7: What tool can you use to help “remember” all your passwords?

A rubber band.
A password manager.
Vitamin E
Yellow sticky notes.

Soru 8: Why is it risky to keep using an operating system that is no longer supported or updated?

The latest social media tools may not work on the old operating system.
Many cyber attacks exploit unpatched vulnerabilities in old, unsupported operating systems.
The hard drive may fail.
The computer may reboot.

Soru 9: When you receive an unsolicited email, what should you do if it has an attachment?

Don’t open the attachment.
Immediately reboot your computer.
Forward the email to all your friends.
Open the attachment to learn how to make money online.

Soru 10: Where can you download the highly-rated and free FortiClient security product from?

forticlientfree.com
freeforticlient.com
Your favorite malware marketplace.
forticlient.com

Fortinet NSE 1 – Ders 4(CFO Perspectives) Cevaplar

Soru 1: A CFO’s responsibility is to manage financial risk, and that covers which other element?

All the information and data in the company.
The after-hours card games.
Costs associated with the building’s janitorial contractor.
The catered lunch in the boardroom.

Soru 2: Being trustworthy with customer data is now a part of which outcome?

Crafting a better user experience.
Building brand loyalty.
Decreasing revenues.
Regulatory fines.

Soru 3: How does a CFO treat intangible assets such as intellectual property, trade secrets, manufacturing methods, and the information about customers?

More responsible for the financial risks to those information assets than any others.
Paper assets
Not responsible at all.
Just as responsible for the financial risks to those information assets as any others.

Soru 4: Looking into the past, a CFO will create which kind of reports?

Billable hours
Timecard reports for individual employees.
TPS reports
Reporting on the prior financial performance of the company.

Soru 5: Since it uses information from every corner of the business, what does a company’s Enterprise Resource Planning (ERP) system require to help the CFO understand what’s happening now, and plan for the future?

Last quarter’s TPS reports.
Accurate and trustworthy information.
A gaggle of consultants.
Several reams of paper.

Soru 6: What are the consequences if a CFO’s reports are not accurate?

There are no consequences since nobody actually reads those reports.
From having to re-state the data, to being found in violation of financial regulations.
The next report must have an offsetting error to compensate.
Other CFOs in the area will catch the error and help fix it.

Soru 7: What does a CFO rely on to create forecasts of what will happen to the company in the future?

Access to good information.
Advice of Wall Street analysts.
Accurate inventory data.
An endless supply of coffee.

Soru 8: What is the primary responsibility of a CFO?

To develop new products and services.
To manage the finances and the financial risks of the company.
To manage the company’s payroll.
To oversee the factory floor.

Soru 9: What poses one of the greatest risks to the financial value of a company’s information assets?

Earthquakes
Cyber threats
Floods
Spelling errors

Soru 10: What role does a CFO play in new business initiatives, product launches and/or new service offerings?

Provides advice on engineering.
Provides advice on marketing.
Conducts focus group research.
Analyzes the financial impact.

Fortinet NSE 1 – Ders 3(CISO Perspectives) Cevaplar

Soru 1: How long has the role of CISO been present?

The role of CISO does not exist yet.
The role of CISO has existed for 129 years.
The role of CISO is relatively new.
The role of CISO is the oldest C-level position.

Soru 2: In many of the breaches, tens of millions of credit cards become compromised, and personally identifiable information for millions of individuals are stolen. What is one result?

Class-action lawsuits
Clearance sales
Market capitalization increase
Increase in share price

Soru 3: In what ways are CISOs often expected to represent the company?

Presenting new products at a trade show booth.
Thought leadership, partnership development, and customer engagement.
Public relations, advertising, and marketing.
Career day at a local school.

Soru 4: Originally, the role of CISO was mostly concerned with which topic?

Operations
Budgeting
Compliance
Finance

Soru 5: What can be said for a company’s data that resides outside their buildings?

It is already secured and protected by the very nature of the cloud.
It must be secured and protected just the same.
It is impossible to even find.
It is impossible to secure or protect.

Soru 6: What do the other C-level executives want from a CISO?

A concrete assessment of information risk and value.
A concrete assessment of vendor performance.
A concrete assessment of website costs.
A concrete assessment of database performance.

Soru 7: What is the result of these breaches becoming the targets of government regulators?

Huge fines
Unexpected tax audits
Increased health department inspections
Lower insurance rates

Soru 8: What is the term for when departments or individuals go outside the corporate policies and spin up their own applications, utilize unapproved or uncoordinated SaaS services, or otherwise allow what may be key information assets to be stored out of our control?

Dodgy IT
Vapor IT
Ninja IT
Shadow IT

Soru 9: What results from the loss of control of customers’ personally identifiable information?

The loss of customer trust and a strengthening of brand reputation.
A rise in customer-created crowdfunding initiatives.
The loss of customer trust and lasting damage to brand reputation.
An increase in customer sympathy and a strengthening of brand reputation.

Soru 10: Where are the information assets in a typical company today?

Consolidated in a central mainframe.
Inside the main building.
Scattered all over the place.
Stored in carefully controlled servers.

Fortinet NSE 1 – Ders 2(CIO Perspectives) Cevaplar

Soru 1: How does implementing multiple security point products from multiple vendors affect managing an environment?

More complicated and more expensive.
Simpler and less expensive.
Requires fewer staff members.
Saves money on rackspace and cooling costs.

Soru 2: Internally to the CIO’s company, what is the overall impact when a cyber attack causes extended downtime, and employees’ time is diverted to post-attack activities?

Productivity is reduced.
Overtime pay is approved.
Productivity is increased.
Morale is increased.

Soru 3: On average, how can a CIO’s tenure be characterized?

CIOs have the longest tenures among C-level executives.
The tenure of a CIO is a step on the path to CFO.
The tenure of a CIO is generally stress-free and relaxing.
CIOs have the shortest tenures among C-level executives.

Soru 4: Regulatory fines related to serious breaches can be characterized in which way?

The proceeds help stimulate the economy.
They are insignificant in all respects.
They can be enormous and seriously impact the bottom line.
Fines are never imposed due to any form of cyber attacks.

Soru 5: What is becoming a regular topic between CIOs, the other C-level executives, and the board of directors?

The relative value of various SaaS offerings.
Executive compensation
Implementing cyber security
The allocation of window and corner offices.

Soru 6: What is the primary responsibility of a CIO?

Controlling the Information Technology (IT) resources of a company.
Creating all the information in a company.
Determining where each information resource will be routed in a company.
Choosing which laptop models to purchase for a company.

Soru 7: What will a CIO do once they understand the company’s business goals and priorities?

Create alternative business plans.
Analyze and design the IT infrastructure so that it aligns with those business goals.
Attend many industry conferences.
Analyze and design new products.

Soru 8: When investments are made in IT infrastructure, what should a CIO do next?

Fill out the warranty cards right away.
Compare budgets with other C-level executives.
Show how these investments deliver measurable results.
Negotiate for quantity discounts.

Soru 9: When the general public learns of a serious breach, what is their likely reaction?

Apathy leading to an increase in business with the breached company.
Empathy and compassion.
Disbelief followed shortly by acceptance.
An erosion of trust leading to a decline in business with the breached company.

Soru 10: Why must a CIO work closely with the other C-level executives?

The other C-level execs always need help with their computers.
To understand the company’s business goals and priorities.
To help choose which laptops to purchase for the company.
To make sure they use strong passwords.