NSE2 Exam
NSE2 Exam
NSE2 Exam
Fortinet
NSE2 EXAM
The Evolution of Cybersecurity Exam
https://www.dumpsplanet.com
m/
Questions and Answers PDF 2/41
A. FortiGate 500D
B. FortiGate 1500D
C. FortiGate 3700D
D. FortiGate 3810D
Answer: C
Question:2
Which data center FortiGate model has 100G ports?
A. FortiGate 500D
B. FortiGate 1500D
C. FortiGate 3700D
D. FortiGate 3810D
Answer: D
Question:3
A. Content Processor
B. CPU
C. Network Processor
D. Switching Processor
Answer: C
Question:4
https://www.dumpsplanet.com
m/
Questions and Answers PDF 3/41
A. 4
B. 5
C. 7
D. 8
Answer: A
Question:5
Where are virtual machine firewall appliances typically deployed?
A. Campus edge
B. Data center
C. Small or branch office
D. Cloud
Answer: B
Question:6
Which FortiASIC is used to accelerate NGFW performance?
A. Content Processor
B. CPU
C. Network Processor
D. Switching Processor
Answer: A
Question:7
What integration is required for SDN Functionality?
Answer: B
Question:8
Howmany elements makeupthe High Performance Integrated Network
Security Platform?
A. 3
https://www.dumpsplanet.com
m/
Questions and Answers PDF 4/41
B. 4
C. 5
D. 6
Answer: A
Question:9
What type of Firewall is used for data center north-south traffic?
A. NGFW Appliance
B. High Speed Data Center Firewall
C. Virtual machine Firewall
D. UTM
Answer: B
Question: 10
What type of Firewall is used for data center north-south traffic?
A. NGFW Appliance
B. High Speed Data Center Firewall
C. Virtual machine Firewall
D. UTM
Answer: C
Question: 11
Whatlength of contract (term) options are availableforlicensing FortiGuard
and FortiCare services with a FortiGate purchase?
A. 1 year only
B. 1 and 2 yearoptions
C. 1, 2 and 3 yearoptions
D. 3 years only
Answer: B
Question: 12
Where are UTM appliances typically deployed?
A. Campus edge
B. Data center
https://www.dumpsplanet.com
m/
Questions and Answers PDF 5/41
Answer: C
Question: 13
Which FortiGate modelshave been tested by NSSin 2014 for NGFW
Performance? (select all that apply)
A. FortiGate 500D
B. FortiGate 1500D
C. FortiGate 3600
D. FortiGate 3700D
Answer: B,C
Question: 14
Which of the following is the core element of the High Performance
Answer: E
Question: 15
Which is a typical Data Center Firewall throughput range?
A. 1 - 100Mbps
B. 1- 1Gbps
C. 1- 20Gbps
D. 10 – 100Gbps
Answer: D
Question: 16
What type of Firewall is used for data center north-south traffic?
A. NGFW Appliance
B. High Speed Data Center Firewall
https://www.dumpsplanet.com
m/
Questions and Answers PDF 6/41
Answer: B
Question: 17
Which FortiGate models are typically used in the data center?
Answer: C
Question: 18
How are FortiCare service prices calculated?
Answer: B
Question: 19
Which is a typical NGFW throughput range?
A. 1 - 100Mbps
B. 1- 1Gbps
C. 1- 20Gbps
D. 10 – 100Gbps
Answer: C
Question: 20
Which of the following is not a key FortiGate differentiator?
https://www.dumpsplanet.com
m/
Questions and Answers PDF 7/41
Answer: B
Question: 21
FortiGate delivers 5x the performance of other NGFWs because of which technology?
Answer: C
Question: 22
The primary reason a customer would buy a Next Generation Firewall is:
Answer: B
Question: 23
What elements must you purchase to get an NGFW solution from Fortinet?
A. FortiGate model
B. FortiGuard services
C. Both FortiGate model and FortiGuard services
Answer: C
Question: 24
True or false, an NGFW canidentify an application amid the total traffic flowing
through the firewall appliance regardless of the port it uses?
A. True
B. False
Answer: A
Question: 25
https://www.dumpsplanet.com
m/
Questions and Answers PDF 8/41
FortiGuard’s services receive top ratings from which independent industry test service?
A. Virus Bulletin
B. AV Comparatives
C. NSS Labs
D. All of the above
Answer: D
Question: 26
FortiGate NGFWs are available as:
A. Hardware appliances
B. Virtual appliances
C. Both hardware and virtual appliances
Answer: C
Question: 27
A. Endpoint
B. DDoS
C. IPS
D. All of the above
Answer: C
Question: 28
True or false, FortiGuard provides the NGFW services for FortiGate?
A. True
B. False
Answer: B
Question: 29
Trueor false, a top reason a customer would buy a Next Generation Firewall is toget
additional protection against advanced threats and to reduce risk of data breach:
A. True
B. False
https://www.dumpsplanet.com
m/
Questions and Answers PDF 9/41
Answer: A
Question: 30
The main customer segment for Next Gen Firewalls is:
A. Enterprise
B. Data Center
C. Small/Home Office
Answer: A
Question: 31
Which of the following are feasible locations to deploy a firewall in the data center?
Answer: D
Question: 32
Which of the following is a correct statement about Virtual Domain functionality?
A. Virtual Domains are used to give hackers the appearance of firewall protection in lieu of an actual
firewall appliance
B. Virtual Domains allow a single FortiGate appliance to be divided upintomultiple logical
firewall instances that can be managed and configured independently.
C. Virtual Domains are used only when protecting virtualized servers.
Answer: B
Question: 33
Whichofthe FortiGate productlines offer NP6 ASIC acceleration, high 10GbE port density, AND high-
speed 40/100 GbE interfaces?
https://www.dumpsplanet.com
m/
Questions and Answers PDF 10/41
Answer: C
Question: 34
What was a given customer scenario when high connections/second and concurrent user sessions
were important firewall performance criteria?
Answer: A
Question: 35
What didseveral key industry analysts cite as aprimary reason Fortinet has ascended to be atop
vendor in carrier and enterprise data center firewalls?
Answer: A
Question: 36
Which of the following statements is correct about security functions available in FortiGate data
center firewalls?
A. They deliver very high firewall throughput, but as a tradeoff do not have intrusion prevention or
antivirus functionality in thebox
B. All FortiGates offer firewall, intrusion prevention, antivirus and other security functionality built
into a common platform
C. Touse multiple security functions, multiple virtual domains mustbeconfigured - one
VDOM must be configuredforfirewall, another for intrusionprevention, etc.
Answer: B
Question: 37
Which is a correct statement about the hardware IPv6 capabilities of the latestgeneration FortiASIC
NP6 network processors?
https://www.dumpsplanet.com
m/
Questions and Answers PDF 11/41
Answer: C
Question: 38
A. True
B. False
Answer: A
Question: 39
Thelatestgeneration FortiASIC NP6 canforward 45 million IPv4 packetspersecond
(pps). What is its IPv6 forwarding performance in comparison?
Answer: C
Question: 40
What is a key reason FortiGate firewalls are much more power efficient than competing vendor
solutions?
A. FortiGate firewalls use custom ASICs that consume one-tenth the power of generalpurpose Intel
CPUs
B. FortiGate firewalls offer slow networkspeedsinordertoconserve power
C. FortiGate firewalls runonbattery packstodraw less power from theplug
Answer: B
Question: 41
The primary reason a customer would buy a UTM device is:
https://www.dumpsplanet.com
m/
Questions and Answers PDF 12/41
Answer: B
Question: 42
FortiGate appliances support which WAN connectivity technologies:
Answer: A
Question: 43
Trueorfalse,FortiGateappliancesprovidereducedcomplexity,simplified management
and reduced training costs?
A. True
B. False
Answer: B
Question: 44
FortiGate appliance provide which FortiGuard Services:
Answer: C
Question: 45
True or false, a UTM’s main function is to enable 2-factor authentication for an enterprise?
A. True
B. False
Answer: A
https://www.dumpsplanet.com
m/
Questions and Answers PDF 13/41
Question: 46
True or false, FortiGate appliances are used primarily to accelerate application delivery
performance?
A. True
B. False
Answer: B
Question: 47
A. Hardware-only appliances
B. Virtual-only appliances
C. Both hardware and virtual appliances
Answer: C
Question: 48
True or false, a UTM device is needed most by organizations that need to protect Web applications?
A. True
B. False
Answer: B
Question: 49
True or false, a UTM device is needed most by organizations that need to protect against DDoS
attacks?
A. True
B. False
Answer: B
Question: 50
If a customer needs a consolidated security device including firewall, VPN, IPS, antivirus, anti-spam,
andweb filtering, toconnectandsecure small and branch office networks, they mostlikely will need:
A. A UTM appliance
https://www.dumpsplanet.com
m/
Questions and Answers PDF 14/41
Answer: A
Question: 51
If an organization needs to connect and secure small and branch offices, they most likely will need:
Answer: B
Question: 52
True or false, a primary reason a customer would buy a UTM device is to protect applications from
code-based vulnerabilities before they are able to attack applications?
A. True
B. False
Answer: B
Question: 53
Advanced threats focus on
Answer: B
Question: 54
Which growing cyber challenges does a malicious hacker use to his benefit in planning an attack?
https://www.dumpsplanet.com
m/
Questions and Answers PDF 15/41
Answer: D
Question: 55
True or False, FortiGuard Security Services are designed for both physical and virtual security
solutions.
A. True
B. False
Answer: B
Question: 56
Answer: B
Question: 57
Synergistic development of your security services will deliver:
Answer: A
Question: 58
Trueor False , Asingle CPRLsignature can catch manyvariants of asinglemalware, including new
ones
A. True
B. False
Answer: A
Question: 59
https://www.dumpsplanet.com
m/
Questions and Answers PDF 16/41
A. To deliver effective prevention by turning unknown threats into known threats, and providing
consistent protection globally
B. To organize security and networking products by threat category
C. To provide a set of qualifying questions on ATP attacks to our customers
Answer: A
Question: 60
Which of the below elements indicate a growing, more sophisticated cybercrime society/ecosystem?
Answer: D
Question: 61
Which Fortinet solution does NOT leverage FortiGuard Labs’ threat intelligence?
A. FortiGate
B. FortiSandbox
C. FortiSwitch
D. FortiMail
Answer: C
Question: 62
What is FortiGuard Labs?
Answer: D
Question: 63
What type of attack element can the Anti-spam Service help prevent?
https://www.dumpsplanet.com
m/
Questions and Answers PDF 17/41
A. Creating a botnet
B. Getting control over an application
C. Serving email witha malicious link
Answer: C
Question: 64
What type of attack element can Web filtering help prevent?
A. Botnet creation
B. Manipulation of end users leading to access of malicious websites
C. Getting control over an application
Answer: B
Question: 65
What type of traffic requires an east-west security strategy?
Answer: C
Question: 66
What type of traditional security strategy is required for traffic between the end user and the data
center resources?
A. East-West
B. Virtualization
C. Public Cloud
D. North-South
Answer: D
Question: 67
Within the SDNS framework, which layer does Fortinet's single plane of glass solution function at?
A. Data plane
B. Control plane
C. Security Plane
https://www.dumpsplanet.com
m/
Questions and Answers PDF 18/41
D. Management plane
Answer: C
Question: 68
Select an example of information a virtual firewall can learn from the control plane functions.
Answer: A
Question: 69
A. The FortiGate Connector allows OpenStack to run as a VM within a FortiGate physical appliance.
B. The FortiGate Connector uses the ML2 plug-in interface to replace the network node within
OpenStack Neutron.
C. TheFortigate Servicemanager communicateddirectlywiththe OpenStack SDNcontroller.
The FortiGate Service manager launches a ……. OpenStack Firewall Node.
Answer: B
Question: 70
Select that Cisco SDN platform that is supported by Fortinet.
A. Cisco ACI
B. CiscoNSX
C. Cisco SDN
D. Cisco CAI
Answer: B
Question: 71
What is one type of data center technology driving the shift in focus to East-West security?
A. SDN
B. Increased Traffic
C. SAN
D. High Availability
https://www.dumpsplanet.com
m/
Questions and Answers PDF 19/41
Answer: A
Question: 72
Within the SDNS framework, which layer does Fortinet's single plane of glass solution function at?
A. Security Plane
B. Management plane
C. Control plane
D. Data plane
Answer: D
Question: 73
What are the three types of Fortinet virtual appliances in the SDN security solution?
A. integrated
B. Ported
C. Private
D. Cloud
E. Hybrid
Answer: A, B,D
Question: 74
Select that Cisco SDN platform that is supported by Fortinet.
A. Cisco CAI
B. Cisco SDN
C. Cisco ACI
D. Cisco NSX
Answer: C
Question: 75
Select the Fortinet product that offers a central management component in a VMware NSX
environment to provide detection of changes such as new workloads, auto-scaling and auto-
provisioning.
https://www.dumpsplanet.com
m/
Questions and Answers PDF 20/41
Answer: B
Question: 76
How are FortiGate VM virtual appliances licensed?
Answer: A
Question: 77
What type of traffic requires an east-west security strategy?
Answer: A
Question: 78
Fortinet supports which three leading SDN platforms? (Select three.)
A. Openstack
B. POX
C. ONOS
D. VMwareNSX
E. Cisco ACI
Answer: C,D,E
Question: 79
What type of traffic flows over the data plane of the SDNS Framework?
https://www.dumpsplanet.com
m/
Questions and Answers PDF 21/41
Answer: D
Question: 80
What is the definition of a virtual firewall?
Answer: C
Question: 81
What are the benefits of SDN technologies?
Answer: B
Question: 82
What granularity of micro-segmentation does FortiGate VMX integration offer in a VMware NSX
environment?
A. Only VMs on different port groups can be segmented from each other
B. Individual VMs can be segmented irrespective of physical or logical network topotogy
C. VMs on different vSwitches can be segmented from each other
D. Only VMs on different networks can be segmented from each other
Answer: B
Question: 83
Application Security is getting more difficult due to which factor(s)?
https://www.dumpsplanet.com
m/
Questions and Answers PDF 22/41
Answer: D
Question: 84
The AppSec solution is best targeted at which segment(s)?
Answer: D
Question: 85
Email security is the key functionality of which Fortinet product?
A. FortiAuthenticator
B. FortiExchange
C. FortiMail
D. FortiWeb
Answer: D
Question: 86
Which Application Solution product is placed at the front door of the data center?
A. FortiDDoS
B. ForliADC
C. FortiWeb
D. FortiManager
Answer: A
Question: 87
Which feature of the FortiADC allows users to reliably access the best performing application server?
Answer: A
https://www.dumpsplanet.com
m/
Questions and Answers PDF 23/41
Question: 88
Answer: C
Question: 89
For financial services, the greatest challenge that can be addressed with application security is:
Answer: B
Question: 90
Which of the following is the closest competitor to Fortinet's Application Security Offerings?
A. AT&T
B. Arbor Networks
C. Kemp Technologies
D. F5
Answer: D
Question: 91
Answer: C
https://www.dumpsplanet.com
m/
Questions and Answers PDF 24/41
Question: 92
Which three (3) of these choices represent the new ways of thinking that must be adopted to achieve
Security without Compromise? (Select three by clicking on multiple checkboxes.)
Answer:A,C,D
Question: 93
One of the major attributes of the Fortinet Security Fabric is "Scalable". Why is that important?
Answer: D
Question: 94
The Fortinet Security Fabric provides coverage to two common types of cloud computing
environments. One of those types is public cloud Infrastructure as a Service (laaS) providers such as
Amazon AWS and Microsoft Azure. What is the other type?
Answer: D
Question: 95
What is the name of the Fortinet solution which ties together Fortinet's Enterprise Firewall, Cloud
Security, Advanced Threat Protection, Application Security and Secure Access products so that they
all operate in a coordinated and cooperative manner?
https://www.dumpsplanet.com
m/
Questions and Answers PDF 25/41
Answer: B
Question: 96
Fortinet's Secure Access Solution extends security policies to the very edge of the network and is an
active participant in which security architecture?
Answer: B
Question: 97
Which three of these are the business drivers for UTM Replacement? (Select three.)
Answer:A,C,D
Question: 98
Which customer benefit occurs because the Management & Analytics solution is able to harvest the
vast telemetry from across the broad Security Fabric and analyze it through a single-point-of-
inspection? (Choose one)
https://www.dumpsplanet.com
m/
Questions and Answers PDF 26/41
Select one:
Answer: A
Question: 99
Although the amount of work is increasing, the skills required to perform the work are increasingly
more advanced, and the sheer volume of security data generated is skyrocketing, what key resource
is not keeping pace?(Choose one)
Select one:
Answer: B
Question: 100
A. Healthcare
B. Large enterprise
C. SMB
D. Distributed retail
Answer: C
Question: 101
The fact that there are elements constantly coming on and off the network, all with varying levels of
security protection, creating an attack surface that is constantly in flux, requires what kind of
analysis? (Choose one)
Select one:
A. Next-level analysis
B. Log analysis
C. SOC analysis
D. NOC analysis
https://www.dumpsplanet.com
m/
Questions and Answers PDF 27/41
Answer: A
Question: 102
The Management & Analytics solutionconsists ofwhichfour Fortinetproducts?(Choosefour)
Select one ormore:
A. FortiManager
B. FortiAnalyzerv
C. FortiAuthenticator
D. FortiSIEM
E. FortiCloud
F. FortiMail
Answer:A,B,D,E
Question: 103
What are the four main usecases for the Fortinet Management& Analytics solution?(Choose four)
Select one ormore:
A. Advanced IP routing
B. Compliance & Auditing
C. Investigation & Incidence Response
D. Remote logging
E. NOC/SOC Dashboards
F. Deployment & Maintenance
Answer:B,C,E,F
Question: 104
Whatisit called when the Management & Analytics solution is used to take security data from across
the broad Security Fabric and uncover insights that cannot be seen by studying data from these
sources individually? (Choose one)
Select one:
Answer: A
Question: 105
https://www.dumpsplanet.com
m/
Questions and Answers PDF 28/41
A. FortiAnalyzer
B. FortiSIEM
C. FortiCloud
D. FortiAuthenticator
E. FortiManager
Answer: C,E
Question: 106
Whichtwobenefitsoccurwhendeploymentandconfiguration tasks arecentralizedandautomated?
(Choose two)
Select one or more:
Answer: E
Question: 107
FortiSIEM is similar to FortiAnalyzer in that they both connect with almost every element of the
Security Fabric (FortiGate, FortiClient, FortiSandbox, FortiWeb, FortiMail, FortiProxy, FortiDDoS, and
FortiAuthenticator). What other type of devices connect with FortiSIEM? (Choose one)
Select one:
Answer: C
Question: 108
Whatdo Web Application Firewalls dothat traditional edge firewalls donot? (Choose two.)
Select one ormore:
https://www.dumpsplanet.com
m/
Questions and Answers PDF 29/41
Answer: A,C
Question: 109
Whatisan application white list?
Select one:
Answer: C
Question: 110
Whatwas theprecursortothe Web Application Firewall?
Select one:
A. Application Firewall
B. Internet Filter
C. Web Firewall
D. Antivirus software
Answer: C
Question: 111
Whichofthefollowing can be integrated with FortiWeb? (Choose two.)
Select one ormore:
A. FortiFax
B. FortiSandbox
C. FortiPhone
D. FortiConnect
E. FortiGate
Answer: B,E
Question: 112
https://www.dumpsplanet.com
m/
Questions and Answers PDF 30/41
Answer: A
Question: 113
Answer: C, D, E
Question: 114
Whatfeature canbeaddedto Secure Email Gateway?
Select one:
Answer: A
Question: 115
What is phishing?
Select one:
Answer: A
https://www.dumpsplanet.com
m/
Questions and Answers PDF 31/41
Question: 116
Answer: A,C
Question: 117
What are spam filters?
Select one:
Answer: C
Question: 118
Basic cloud security can be achieved by native cloud security tools. What is a potential problem
should customers rely solely on these tools? Select one:
Answer: D
Question: 119
https://www.dumpsplanet.com
m/
Questions and Answers PDF 32/41
C. A thick liquid served with food, usually savory dishes, to add moistness and flavour.
D. Software as a Service.
Answer: D
Question: 120
Identify thecloudservicevendorswithwhichthe Fortinet Security Fabricintegrates. {Choose three.)
Select one ormore:
A. AWSv
B. Cumulus Cloud
C. Azure
D. Google Cloud
E. Cumulonimbus Cloud
Answer:A,C,D
Question: 121
What was the reason that drove organizations from the traditional network architecture to the
cloud?
Select one:
A. The cloud allows you to move datacenters and other services to a third-party network.
B. The cloud can make network security more complicated.
C. The cloud was an alluring fad.
D. Thecost savings that arerealized whenmoving from owning expensive hardware that is only
partially utilized to renting only when needed, v
Answer: D
Question: 122
Answer: C,D
Question: 123
https://www.dumpsplanet.com
m/
Questions and Answers PDF 33/41
Answer: A,D
Question: 124
Whatwas a major weakness of the traditional network that MPLSsolved?
Select one:
A. Device identification x
B. Latency
C. Security
D. Scalability
Answer: A
Question: 125
The traditional network that supported multiple geographic locations used dedicated high-speed
lines to send data between HO and its branches. Identify an attribute of this type of network.
Select one:
Answer: C
Question: 126
A. An MPLS network uses a dedicated line, while an SD-WAN network uses the party line.
B. In an MPLS network only the datacenter has direct internet access, while in an SD-WAN network
there are multiple access points.
C. An MPLS network uses a 80 bits encryption, while SD-WAN uses 256 bit.
D. An MPLS network uses the super-duper accelerator, while SD-WAN does not.
https://www.dumpsplanet.com
m/
Questions and Answers PDF 34/41
Answer: B
Question: 127
Whal is thename of the Fortinet productthat providesboth SD-WAN and NGFW security? Select
one:
A. ForitKidslnTheHall
B. FortiSandbox
C. FortiGate
D. Forti Something
Answer: B
Question: 128
The traditional network that supported multiple geographic locations used dedicated high-speed
lines to send data between HQ and its branches. Identify an attribute of this type of network.
Select one:
A. Very scalable.
B. Very upscale.
C. The data line was not shared with other organizations.
D. Data packets were assigned a pre-determined path through the network using labels.
Answer: C
Question: 129
With the rise of the Internet, what happenedto the rate that new malware variants appear? (Choose
one.)
Select one:
Answer: B
Question: 130
Whatwere the early formsofendpointsecurity productsknownas?{Choose one.)
Select one:
https://www.dumpsplanet.com
m/
Questions and Answers PDF 35/41
A. Antivirus software
B. Disk-infectants
C. Floppy disks
D. Sandbox
Answer: A
Question: 131
Modern endpoint solutions must identify existing, known threats. What other type of threats must
they detect? (Choose one.) Select one:
Answer: B
Question: 132
Whatmethoddidtheearlyantivirus productsusetodetectmalware? (Choose one.)
Select one:
A. Compare the signature of the file with a list of known virus signatures.
B. Compare the name of the file with a list of known virus names.
C. Search for the word "virus" in the contents of the file.
D. Search for the word "virus" in the file name.
Answer: A
Question: 133
What must modern endpoint solutions do to be effective today? (Choose one.) Select one:
Answer: D
Question: 134
Along with firewalls, most networks rely on a set of network services to function properly or provide
different types of
https://www.dumpsplanet.com
m/
Questions and Answers PDF 36/41
A. Anti-virus
B. Network switching
C. Endpoint control
D. Application layer filtering
E. DHCP
Answer: A,C
Question: 135
Second generation firewalls were designed to add more functionality. What additional functionality
did they bring?
Select one:
A. They observe network connections over time and continuously examine conversations between
endpoints.
B. They block any conversation that uses bad language.
C. They look up the IP address of the sender to determine if the source is on a suspect network.
D. They examine packet headers to detect if the packet contains viruses.
Answer: A
Question: 136
Innetwork security, whatis the purpose ofa firewall?
Select one:
Answer: A
Question: 137
Whatworksclosely with FortiGate firewall products toprovide thehighestlevel ofnetworksecurity?
Select one:
A. NSS Labs
B. Interpol
C. FortiGuard Labs
D. Gartner
https://www.dumpsplanet.com
m/
Questions and Answers PDF 37/41
Answer: C
Question: 138
Whatis the nameofthe Fortinetproductthatprovidesboth SD-WAN and NGFWsecurity?
Select one:
A. FortiGate
B.FortiSandbox
C. ForitKidsInTheHall
D. FortiSomething
Answer: A
Question: 139
Whatarethesandbox characteristics?(Choose two.)
Select one ormore:
Answer: B,D
Question: 140
Whatbusiness problemsis FortiSandboxtryingtosolve? (Choose two.)
Select one ormore:
Answer: B
Question: 141
https://www.dumpsplanet.com
m/
Questions and Answers PDF 38/41
Answer: A
Question: 142
Whathappens tothe codeif the sandbox detects thatit has malicious intent?
Select one:
Answer: B
Question: 143
What is the Fortinet’s SIEM product?
A. Select one:
B. FortiSandbox
C. FortiManager
D. FortiGate
E. FortiSIEM
Answer: D
Question: 144
Answer: A,C
Question: 145
Pick three regulatory standards and acts businesses, hospitals, and other organizations must comply
https://www.dumpsplanet.com
m/
Questions and Answers PDF 39/41
A. PCI
B. XSLT
C. HIPAA
D. GDPR
E. SPML
Answer:A,C,D
Question: 146
Whatarethe problems that SIEM solves? (Choose three.)
Select one ormore:
Answer: C
Question: 147
Whatisthename of Fortinet's threatintelligence service?
Select one:
A. NSE
B. Fortinet Labs
C. FortiGate Labs
D. FortiGuard Labs
Answer: D
Question: 148
Whydothevarious vendorssharetheirthreat informationwithothervendors?
Select one:
Answer: B
https://www.dumpsplanet.com
m/
Questions and Answers PDF 40/41
Question: 149
The threat intelligence service catalogs the knowledge about existing or emerging attacks, including
the specific mechanisms
of theattack, theevidence thattheattack has happened.
This is also known by which term?
Select one:
A. Intelligence Catalogs
B. Indicators of Compromise
C. Implicators of Compromise
D. Machine Learning
E. Artificial Intelligence
Answer: A
Question: 150
What security challenge was created when the malware authors began to make malware that
morphs into different forms?
Select one:
Answer: A
https://www.dumpsplanet.com
m/