Q&A10 [FCA] FortiGate 7.4 Operator Exam - Question & Answer Q. In addition to central processing unit (CPU) and memory usage, what are two other key performance parameters you should monitor on FortiGate? (Choose two.) Select one or more: - Number of days for licenses to expire - Number of active VPN tunnels - Number of SSL sessions - Number of local users and user groups Q. Which inspection mode processes and forwards each packet, without waiting for th.. [Certification]/[FCA] Fortinet Certified Associate 2024. 5. 27. [FCF] Cybersecurity 2.0 - Lesson 15 : SASE (Quesion&Answer) Q. What are two benefits of SASE? (Choose two) Select one or more: - Limits “Bring-Your-Own-Device” behavior in the organization - Optimized paths for all users to all clouds to improve performance and agility - Consistent security for mobile workforces - Limits the number of remote off network users connecting to cloud-based applications - Shift from operating expense to capital expense Q. Wha.. [Certification]/[FCF] Fortinet Certified Fundamentals 2024. 5. 19. [FCF] Cybersecurity 2.0 - Lesson 12 : SD-WAN (Quesion&Answer) Q. Complete the sentence. WAN is a computer network that Select one: - limits the number of switches and routers to reduce maintenance and administration. - is a hybrid of on-premise devices and virtual servers across multiple cloud vendors. - uses primarily virtual computers, thus expanding the east-west axis. - spans a large geographic area and typically consists of two or more LANs.Q. Which f.. [Certification]/[FCF] Fortinet Certified Fundamentals 2024. 5. 19. [FCF] Cybersecurity 2.0 - Lesson 11 : SIEM (Quesion&Answer) Q. What was the impetus for more automation and machine learning in later SIEM devices? Select one: - Demand to reduce MIS costs - Shortage of trained personnel - Need to improve MIS efficiency - Requirement to manage Big Data Q. Which two requirements were the motivation for SIEM? (Choose two.) Select one or more: - Increasing number of alerts - Exploiting Big Data - Complying to regulation.. [Certification]/[FCF] Fortinet Certified Fundamentals 2024. 5. 19. [FCF] Cybersecurity 2.0 - Lesson 10 : SOAR (Quesion&Answer) Q. What is alert fatigue? Select one: - Analysts reduce the number of alerts using SOAR - Analysts are overwhelmed by the number of alerts- Measures the time lag to resolve alerts - The SOAR system is overloaded by the amount of network traffic Q. What are three reasons SOAR is used? (Choose three.) Select one or more: - Analyze workload - Reduce alert fatigue- Collaborate with other analysts .. [Certification]/[FCF] Fortinet Certified Fundamentals 2024. 5. 19. [FCF] Cybersecurity 2.0 - Lesson 09 : Endpoint Monitoring (Quesion&Answer) Q. Which platform can preemptively block new, undiscovered attacks? Select one: - Endpoint detection and response - Endpoint management system- Zero trust network access - Next generation firewall Q. Which feature is a function of both EPP and EDR? Select one: - Administrative top-down visibility - Enforcement of security policies - Data loss prevention - Antivirus scanning Q. Which two elements.. [Certification]/[FCF] Fortinet Certified Fundamentals 2024. 5. 19. [FCF] Cybersecurity 2.0 - Lesson 05: Secure Email Gateway (Quesion&Answer) Q. In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.) Select one or more: - Email emulator - Firewall - Antivirus scanner - Sandbox Q. Which challenge caused secure email gateway (SEG) to adopt automation and machine learning? Select one: - Volume of attacks - Delay in implementing the sender policy framework - Success of click-b.. [Certification]/[FCF] Fortinet Certified Fundamentals 2024. 5. 19. [FCF] Cybersecurity 2.0 - Lession 01 : Firewalls (Quesion&Answer) Q. Which type of firewall was the first generation of firewalls? Select one: - Application layer - Stateful - Packet filter - Next-generation firewall (NGFW) Q.Which three traits are characteristics of a next generation firewall (NGFW)? (Choose three.) Select one or more: - Inspects only unencrypted packets - Can segment a network based on user, device, and application type - Uses AI to enforce .. [Certification]/[FCF] Fortinet Certified Fundamentals 2024. 5. 19. [FCF] Threat Landscape - Module 2 : Quesion&Answer Q. Which expression would best qualify as threat intelligence? Select one: - A list of malicious IP addresses and domain names- Data feeds from a Security Information and Event Manager (SIEM)- Security implications and actionable advice- News of a cyberattack on another organization’s network Q. Which three requisite qualities must information have for it to be threat intelligence? (Choose three.. [Certification]/[FCF] Fortinet Certified Fundamentals 2024. 5. 4. [FCF] Threat Landscape - Module 1 : Quesion&Answer Module 1: Introduction to CybersecurityQ. What are the three principles of information security (InfoSec), also known as the CIA triad? (Choose three.) Select one or more:- Incorruptibility - Confidentiality - Integrity - Availability - Accountability Q. Which definition accurately describes information systems security? Select one: - The control of physical access to a building or room where s.. [Certification]/[FCF] Fortinet Certified Fundamentals 2024. 5. 4. 이전 1 다음