Evolution of Enterprise Networks
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which role does the Distributed Enterprise Firewall (DEFW) play in the Enterprise Firewall solution?

  • Protecting corporate services
  • Inspecting incoming traffic
  • Serving as breach containers for attacks from inside
  • Securing branch offices and remote sites (correct)

What are the main functions of the Next Generation Firewall (NGFW)?

  • Firewall, application control, IPS, web filtering, and antivirus inspection
  • Firewall, application control, and IPS
  • Firewall, application control, IPS, and web filtering
  • Firewall, application visibility, intrusion prevention, malware detection, and VPNs (correct)

Where are Data Center Firewalls (DCFW) usually installed in the network?

  • Core
  • Branch offices and remote sites
  • Distribution layer (correct)
  • Corporate headquarters

What is the purpose of Internal Segmentation Firewalls (ISFW)?

<p>Splitting the network into multiple security segments (D)</p> Signup and view all the answers

What is the core of the Fortinet Enterprise Firewall solution?

<p>FortiOS (B)</p> Signup and view all the answers

What does the Security Fabric enable in an enterprise network?

<p>Communication of all security devices (D)</p> Signup and view all the answers

What are the form factors of the Fortinet Enterprise Firewall solution?

<p>Multiple physical configurations (A)</p> Signup and view all the answers

What are the two management and reporting tools mentioned in the text?

<p>FortiManager and FortiAnalyzer (C)</p> Signup and view all the answers

What is the zero-trust model?

<p>The understanding that attacks can come from anywhere, using any method (B)</p> Signup and view all the answers

What should network administrators no longer take for granted?

<p>The trustworthiness of everything and everyone inside the network (C)</p> Signup and view all the answers

Which type of attacks are enterprises required to protect against?

<p>Zero-day attacks (A)</p> Signup and view all the answers

What has happened to the enterprise perimeter in recent times?

<p>It has expanded to include more devices and networks (D)</p> Signup and view all the answers

What is the traditional way of protecting a network by securing the perimeter?

<p>Firewall solutions (A)</p> Signup and view all the answers

What can bypass an entry-point firewall and gain access to the network?

<p>Malware (C)</p> Signup and view all the answers

What is the term used to describe the challenge of securing complex networks with BYOD, mobile users, remote workforce, and evolving cloud technologies?

<p>Borderless networks (B)</p> Signup and view all the answers

Which of the following is NOT a potential insider threat to the network?

<p>Denial of Service (DoS) attack (B)</p> Signup and view all the answers

What is the term used to describe malware that can change its code to avoid detection?

<p>Polymorphic malware (D)</p> Signup and view all the answers

What is the term used to describe attacks that are unknown and have no known defense?

<p>Zero-day attacks (C)</p> Signup and view all the answers

What is the term used to describe attacks that are targeted and stealthy, often carried out by skilled hackers?

<p>Advanced persistent threats (APTs) (C)</p> Signup and view all the answers

What is the term used to describe the model where the network is not trusted by default and every access request is verified?

<p>Zero-trust model (B)</p> Signup and view all the answers
Use Quizgecko on...
Browser
Browser