Fortinet NSE 2 – Quiz 5

1. The threat intelligence service catalogs data about existing or emerging attacks, including the specific mechanisms of the attack, and evidence that the attack has happened. What is this data also known as?
2. Which are three functions of sandboxing? (Choose three.)
3. What happens when each known malware file is represented by a one-to-one signature approach?
4. In the early days of threat intelligence service, in which three timeframes were vendor updates released? (Choose three.)
5. Which statement about cyber-attacks is true?

Leave a Reply

Your email address will not be published. Required fields are marked *