본문 바로가기

[Certification]/[FCF] Fortinet Certified Fundamentals

[FCF] Cybersecurity 2.0 - Lesson 15 : SASE (Quesion&Answer)

Q. What are two benefits of SASE? (Choose two)
Select one or more:

- Limits “Bring-Your-Own-Device” behavior in the organization
- Optimized paths for all users to all clouds to improve performance and agility 
- Consistent security for mobile workforces 
- Limits the number of remote off network users connecting to cloud-based applications 
- Shift from operating expense to capital expense


Q. What are three core capabilities of SASE? (Choose three)
Select one or more:

- Security Fabric management 
- Data loss prevention  
- Next-Generation firewall
- Zero-Trust network access
- Threat intelligence sharing 


Q. What is the goal of SASE?
Select one:

- Provide management and deployment of security devices and cloud security services for organizations
- Provide real-time analysis of security alerts generated by applications and network hardware
- Provide threat intelligence updates to protect organizations from malicious and sophisticated cyber-attacks
- Support the dynamic, secure access needs of today’s organizations by extending enterprise-grade security and networking regardless of location 


Q. What is a result of outdated network security solutions requiring all traffic running through the core data center for inspection?
Select one:

- Latency
Increased deployment time 
- Decreased  time for event analysis and remediation
- Higher capital expenditure


Q.Which statement is true regarding how SASE is delivered?
Select one:

- SASE must be delivered using cloud-based services only
- SASE is delivered using a combination of cloud-based services and optional physical on premise devices 
- SASE is delivered only to remote users, and not to branch offices
- SASE must be delivered using a combination of physical on premise devices and cloud-based services


Q. Which two cloud capabilities are combined to deliver SASE? (Choose two)
Select one or more:

- Database-as-a-Service
- Security-as-a-Service 
- Network-as-a-Service 
- API-as-a-Service


Q. For network security, which three challenges have emerged as a result of rapid and disruptive digital innovation? (Choose three)
Select one or more:

- Too few security vendors to choose from 
- Evolving compliance requirements 
- Expanding attack surface 
- Growing number of off-network users accessing the central data center, without proper security V
- Resistance to multi-cloud adoption from the enterprise 


Q. What does the term “Thin Edge” refer to?
Select one:

- A poorly protected network
- branch locations with minimal security that are attached to a core network 
- Remote users
- An organization that consumes little to no cloud-based services


Q. What behavior has impacted how users access corporate information, and thus requirements for network security?
Select one:

- Users upgrading software to obtain current features, bug fixes and security patches
- Users having different login credentials to access different systems 
- Users accessing enterprise systems through personal devices that are not part of the enterprise infrastructure
- Users having multiple email accounts