NSE 2 Lesson 7 – NSE 2 Threat Intelligence Services

NSE 2 Lesson 7 – NSE 2 Threat Intelligence Services, Fortigate exam Forti Exam, NSE 2 Lesson 7 NSE 2 Threat Intelligence Services

NSE 2 Threat Intelligence Services

Question 1

Question text

What is the sandbox detection method known as?

Select one:

  • Check sum detection
  • Rule-based detection
  • Heuristic detection
  • Signature-based detection

Question 2

Question text

Which behavior does a sandbox look for when searching for malware?

Select one:

  • Behaved abnormally
  • Exploited known software weakness
  • Matched signatures
  • Failed check sum

Question 3

Question text

In the early days, with which three frequencies did vendors update AV signatures? (Choose three.)

Select one or more:

  • Bi-annually
  • Monthly
  • Annually
  • Quarterly
  • Weekly

Question 4

Question text

Which statement best describes an indicator of compromise (IoC)?

Select one:

  • Valuable information about computer systems and the network
  • Evidence that a cyberattack has happened or is ongoing
  • Sources of potential threat actors and their sponsors
  • A list of network devices that are known to be compromised

Question 5

Question text

In the early days, with which three frequencies did vendors update AV signatures? (Choose three.)

Select one or more:

  • Monthly
  • Annually
  • Weekly
  • Bi-annually
  • Quarterly

Question 6

Question text

Which method best defeats unknown malware?

Select one:

  • Sandboxing
  • Signature-based detection
  • Web filtering
  • Predicted malware detection

Question 7

Question text

Which two organizations are examples of a threat intelligence service that serves the wider security community? (Choose two.)

Select one or more:

  • NIST
  • FortiGuard Labs
  • Malware-as-a-Service
  • Cyber Threat Alliance

Question 8

Question text

Which statement best describes polymorphic malware?

Select one:

  • Polymorphic malware is a malware family with thousands of variants but behaving the same way.
  • Polymorphic malware is malware that exploits an unknown security weakness in an application or OS.
  • Polymorphic malware is malware that remains unique and unchanging.
  • Polymorphic malware is unsophisticated malware that can evade signature-based scanning.

NSE Lesson 6