Evolution of Enterprise Networks

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which role does the Distributed Enterprise Firewall (DEFW) play in the Enterprise Firewall solution?

  • Protecting corporate services
  • Inspecting incoming traffic
  • Serving as breach containers for attacks from inside
  • Securing branch offices and remote sites (correct)

What are the main functions of the Next Generation Firewall (NGFW)?

  • Firewall, application control, IPS, web filtering, and antivirus inspection
  • Firewall, application control, and IPS
  • Firewall, application control, IPS, and web filtering
  • Firewall, application visibility, intrusion prevention, malware detection, and VPNs (correct)

Where are Data Center Firewalls (DCFW) usually installed in the network?

  • Core
  • Branch offices and remote sites
  • Distribution layer (correct)
  • Corporate headquarters

What is the purpose of Internal Segmentation Firewalls (ISFW)?

<p>Splitting the network into multiple security segments (D)</p> Signup and view all the answers

What is the core of the Fortinet Enterprise Firewall solution?

<p>FortiOS (B)</p> Signup and view all the answers

What does the Security Fabric enable in an enterprise network?

<p>Communication of all security devices (D)</p> Signup and view all the answers

What are the form factors of the Fortinet Enterprise Firewall solution?

<p>Multiple physical configurations (A)</p> Signup and view all the answers

What are the two management and reporting tools mentioned in the text?

<p>FortiManager and FortiAnalyzer (C)</p> Signup and view all the answers

What is the zero-trust model?

<p>The understanding that attacks can come from anywhere, using any method (B)</p> Signup and view all the answers

What should network administrators no longer take for granted?

<p>The trustworthiness of everything and everyone inside the network (C)</p> Signup and view all the answers

Which type of attacks are enterprises required to protect against?

<p>Zero-day attacks (A)</p> Signup and view all the answers

What has happened to the enterprise perimeter in recent times?

<p>It has expanded to include more devices and networks (D)</p> Signup and view all the answers

What is the traditional way of protecting a network by securing the perimeter?

<p>Firewall solutions (A)</p> Signup and view all the answers

What can bypass an entry-point firewall and gain access to the network?

<p>Malware (C)</p> Signup and view all the answers

What is the term used to describe the challenge of securing complex networks with BYOD, mobile users, remote workforce, and evolving cloud technologies?

<p>Borderless networks (B)</p> Signup and view all the answers

Which of the following is NOT a potential insider threat to the network?

<p>Denial of Service (DoS) attack (B)</p> Signup and view all the answers

What is the term used to describe malware that can change its code to avoid detection?

<p>Polymorphic malware (D)</p> Signup and view all the answers

What is the term used to describe attacks that are unknown and have no known defense?

<p>Zero-day attacks (C)</p> Signup and view all the answers

What is the term used to describe attacks that are targeted and stealthy, often carried out by skilled hackers?

<p>Advanced persistent threats (APTs) (C)</p> Signup and view all the answers

What is the term used to describe the model where the network is not trusted by default and every access request is verified?

<p>Zero-trust model (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser