Evolution of Enterprise Networks
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which role does the Distributed Enterprise Firewall (DEFW) play in the Enterprise Firewall solution?

  • Protecting corporate services
  • Inspecting incoming traffic
  • Serving as breach containers for attacks from inside
  • Securing branch offices and remote sites (correct)
  • What are the main functions of the Next Generation Firewall (NGFW)?

  • Firewall, application control, IPS, web filtering, and antivirus inspection
  • Firewall, application control, and IPS
  • Firewall, application control, IPS, and web filtering
  • Firewall, application visibility, intrusion prevention, malware detection, and VPNs (correct)
  • Where are Data Center Firewalls (DCFW) usually installed in the network?

  • Core
  • Branch offices and remote sites
  • Distribution layer (correct)
  • Corporate headquarters
  • What is the purpose of Internal Segmentation Firewalls (ISFW)?

    <p>Splitting the network into multiple security segments</p> Signup and view all the answers

    What is the core of the Fortinet Enterprise Firewall solution?

    <p>FortiOS</p> Signup and view all the answers

    What does the Security Fabric enable in an enterprise network?

    <p>Communication of all security devices</p> Signup and view all the answers

    What are the form factors of the Fortinet Enterprise Firewall solution?

    <p>Multiple physical configurations</p> Signup and view all the answers

    What are the two management and reporting tools mentioned in the text?

    <p>FortiManager and FortiAnalyzer</p> Signup and view all the answers

    What is the zero-trust model?

    <p>The understanding that attacks can come from anywhere, using any method</p> Signup and view all the answers

    What should network administrators no longer take for granted?

    <p>The trustworthiness of everything and everyone inside the network</p> Signup and view all the answers

    Which type of attacks are enterprises required to protect against?

    <p>Zero-day attacks</p> Signup and view all the answers

    What has happened to the enterprise perimeter in recent times?

    <p>It has expanded to include more devices and networks</p> Signup and view all the answers

    What is the traditional way of protecting a network by securing the perimeter?

    <p>Firewall solutions</p> Signup and view all the answers

    What can bypass an entry-point firewall and gain access to the network?

    <p>Malware</p> Signup and view all the answers

    What is the term used to describe the challenge of securing complex networks with BYOD, mobile users, remote workforce, and evolving cloud technologies?

    <p>Borderless networks</p> Signup and view all the answers

    Which of the following is NOT a potential insider threat to the network?

    <p>Denial of Service (DoS) attack</p> Signup and view all the answers

    What is the term used to describe malware that can change its code to avoid detection?

    <p>Polymorphic malware</p> Signup and view all the answers

    What is the term used to describe attacks that are unknown and have no known defense?

    <p>Zero-day attacks</p> Signup and view all the answers

    What is the term used to describe attacks that are targeted and stealthy, often carried out by skilled hackers?

    <p>Advanced persistent threats (APTs)</p> Signup and view all the answers

    What is the term used to describe the model where the network is not trusted by default and every access request is verified?

    <p>Zero-trust model</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser