Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

15/4/2020 Threat Intelligence Services

 The Evolution of Cybersecurity

Started on Wednesday, April 15, 2020, 10:22 PM


State Finished
Completed on Wednesday, April 15, 2020, 10:31 PM
Time taken 8 mins 34 secs
Points 1/5
Grade 23 out of 100
Feedback I'm sorry, you did not pass.

Question 1 What happens when each known malware file is represented by a one-to-one signature approach?
Correct

1 points out of 1 Select one:


The malware count increases daily, however it can be detected early by a one-to-one signature approach.

There are more vendor organizations that are able to keep up with the increasing number of malware files.

It does not scale well, because the number of malware files increases by millions or more each day. 

Malware-as-a-service organizations provide do-it-yourself malware kits as a solution.

The variations of malware are easily detected thanks to the affordability of malware kits.

Question 2 The threat intelligence service catalogs data about existing or emerging attacks, including the specific mechanisms of the attack, and
Incorrect evidence that the attack has happened.
0 points out of 1  
What is this data also known as?

Select one:
Indicators of compromise

Intelligence catalogs

Machine learning

Artificial intelligence

Sandboxing 

Question 3 Which are three functions of sandboxing? (Choose three.)


Incorrect

0 points out of 1 Select one or more:


Depending on the configuration, the owner of the sandbox can propagate this new knowledge across their network security
environment.

Sandboxing quarantines suspicious files and immediately flags them as malware. 

Sandboxing products take a suspect file and places it in an environment where its behaviors can be closely analyzed.

After some time, if nothing malicious is detected in the quarantined files, the sandbox declares them as safe and releases them
from quarantine. 

Sandboxes can send the details to the vendor’s threat intelligence service so that the details can be shared worldwide. 

https://training.fortinet.com/mod/quiz/review.php?attempt=2961822&cmid=53692 1/2
15/4/2020 Threat Intelligence Services

Question 4 In the early days of threat intelligence service, in which three timeframes were vendor updates released? (Choose three.)
Partially correct

0 points out of 1 Select one or more:


Once a year

Twice a year

Every week 

Monthly 

Quarterly 

Question 5 Which statement about cyber-attacks is true?


Incorrect

0 points out of 1 Select one:


It is important that individuals become more aware of and knowledgeable about any attacks. 

Security products and threat intelligence services that can act together in real time stand the best chance of stopping these
attacks.

There is no secrecy within security vendors and all information is shared.

Sharing intelligence among security vendors is the best way to fight threats.

As bad actors continue to evolve it is important to invest in expensive security products.

https://training.fortinet.com/mod/quiz/review.php?attempt=2961822&cmid=53692 2/2

You might also like