Podcast
Questions and Answers
Which role does the Distributed Enterprise Firewall (DEFW) play in the Enterprise Firewall solution?
Which role does the Distributed Enterprise Firewall (DEFW) play in the Enterprise Firewall solution?
- Protecting corporate services
- Inspecting incoming traffic
- Serving as breach containers for attacks from inside
- Securing branch offices and remote sites (correct)
What are the main functions of the Next Generation Firewall (NGFW)?
What are the main functions of the Next Generation Firewall (NGFW)?
- Firewall, application control, IPS, web filtering, and antivirus inspection
- Firewall, application control, and IPS
- Firewall, application control, IPS, and web filtering
- Firewall, application visibility, intrusion prevention, malware detection, and VPNs (correct)
Where are Data Center Firewalls (DCFW) usually installed in the network?
Where are Data Center Firewalls (DCFW) usually installed in the network?
- Core
- Branch offices and remote sites
- Distribution layer (correct)
- Corporate headquarters
What is the purpose of Internal Segmentation Firewalls (ISFW)?
What is the purpose of Internal Segmentation Firewalls (ISFW)?
What is the core of the Fortinet Enterprise Firewall solution?
What is the core of the Fortinet Enterprise Firewall solution?
What does the Security Fabric enable in an enterprise network?
What does the Security Fabric enable in an enterprise network?
What are the form factors of the Fortinet Enterprise Firewall solution?
What are the form factors of the Fortinet Enterprise Firewall solution?
What are the two management and reporting tools mentioned in the text?
What are the two management and reporting tools mentioned in the text?
What is the zero-trust model?
What is the zero-trust model?
What should network administrators no longer take for granted?
What should network administrators no longer take for granted?
Which type of attacks are enterprises required to protect against?
Which type of attacks are enterprises required to protect against?
What has happened to the enterprise perimeter in recent times?
What has happened to the enterprise perimeter in recent times?
What is the traditional way of protecting a network by securing the perimeter?
What is the traditional way of protecting a network by securing the perimeter?
What can bypass an entry-point firewall and gain access to the network?
What can bypass an entry-point firewall and gain access to the network?
What is the term used to describe the challenge of securing complex networks with BYOD, mobile users, remote workforce, and evolving cloud technologies?
What is the term used to describe the challenge of securing complex networks with BYOD, mobile users, remote workforce, and evolving cloud technologies?
Which of the following is NOT a potential insider threat to the network?
Which of the following is NOT a potential insider threat to the network?
What is the term used to describe malware that can change its code to avoid detection?
What is the term used to describe malware that can change its code to avoid detection?
What is the term used to describe attacks that are unknown and have no known defense?
What is the term used to describe attacks that are unknown and have no known defense?
What is the term used to describe attacks that are targeted and stealthy, often carried out by skilled hackers?
What is the term used to describe attacks that are targeted and stealthy, often carried out by skilled hackers?
What is the term used to describe the model where the network is not trusted by default and every access request is verified?
What is the term used to describe the model where the network is not trusted by default and every access request is verified?