Podcast
Questions and Answers
Which role does the Distributed Enterprise Firewall (DEFW) play in the Enterprise Firewall solution?
Which role does the Distributed Enterprise Firewall (DEFW) play in the Enterprise Firewall solution?
What are the main functions of the Next Generation Firewall (NGFW)?
What are the main functions of the Next Generation Firewall (NGFW)?
Where are Data Center Firewalls (DCFW) usually installed in the network?
Where are Data Center Firewalls (DCFW) usually installed in the network?
What is the purpose of Internal Segmentation Firewalls (ISFW)?
What is the purpose of Internal Segmentation Firewalls (ISFW)?
Signup and view all the answers
What is the core of the Fortinet Enterprise Firewall solution?
What is the core of the Fortinet Enterprise Firewall solution?
Signup and view all the answers
What does the Security Fabric enable in an enterprise network?
What does the Security Fabric enable in an enterprise network?
Signup and view all the answers
What are the form factors of the Fortinet Enterprise Firewall solution?
What are the form factors of the Fortinet Enterprise Firewall solution?
Signup and view all the answers
What are the two management and reporting tools mentioned in the text?
What are the two management and reporting tools mentioned in the text?
Signup and view all the answers
What is the zero-trust model?
What is the zero-trust model?
Signup and view all the answers
What should network administrators no longer take for granted?
What should network administrators no longer take for granted?
Signup and view all the answers
Which type of attacks are enterprises required to protect against?
Which type of attacks are enterprises required to protect against?
Signup and view all the answers
What has happened to the enterprise perimeter in recent times?
What has happened to the enterprise perimeter in recent times?
Signup and view all the answers
What is the traditional way of protecting a network by securing the perimeter?
What is the traditional way of protecting a network by securing the perimeter?
Signup and view all the answers
What can bypass an entry-point firewall and gain access to the network?
What can bypass an entry-point firewall and gain access to the network?
Signup and view all the answers
What is the term used to describe the challenge of securing complex networks with BYOD, mobile users, remote workforce, and evolving cloud technologies?
What is the term used to describe the challenge of securing complex networks with BYOD, mobile users, remote workforce, and evolving cloud technologies?
Signup and view all the answers
Which of the following is NOT a potential insider threat to the network?
Which of the following is NOT a potential insider threat to the network?
Signup and view all the answers
What is the term used to describe malware that can change its code to avoid detection?
What is the term used to describe malware that can change its code to avoid detection?
Signup and view all the answers
What is the term used to describe attacks that are unknown and have no known defense?
What is the term used to describe attacks that are unknown and have no known defense?
Signup and view all the answers
What is the term used to describe attacks that are targeted and stealthy, often carried out by skilled hackers?
What is the term used to describe attacks that are targeted and stealthy, often carried out by skilled hackers?
Signup and view all the answers
What is the term used to describe the model where the network is not trusted by default and every access request is verified?
What is the term used to describe the model where the network is not trusted by default and every access request is verified?
Signup and view all the answers