Fortinet Nse 2 - Lesson 6
Fortinet Nse 2 - Lesson 6
Fortinet Nse 2 - Lesson 6
--------
In this lesson, you will learn how firewalls were created to solve early network
security problems and how, as those problems changed, firewall technology has
adapted to keep networks protected.
Question 1
What did early packet filter firewalls do when they detected a packet that did not
comply with their rules? (Choose two.)
Select one or more:
Launched a DDOS attack on the sender’s IP address
Blocked the packet and sent a message to the sender [CORRECT ANSWER]
Marked the packet as suspect, but continued to send to the destination IP address
Silently dropped the packet [CORRECT ANSWER]
Question 2
What three key, additional security features do next-generation firewalls provide,
that legacy firewalls do not? (Choose three.)
Select one or more:
Application visibility and control [CORRECT ANSWER]
Web application firewall [CORRECT ANSWER]
Intrusion prevention system (IPS) [CORRECT ANSWER]
Packet-filtering based on IP address
Question 3
What additional functionality did second generation firewalls provide that early
packet filter firewalls did not?
Select one:
They looked up the IP address of the sender to determine if the source was on a
suspect network.
They examined packet headers to detect if the packet contained viruses.
They observed network connections over time and continuously examined conversations
between endpoints. [CORRECT ANSWER]
They were stateless firewalls that allowed rogue packets that did not belong to an
existing connection to pass through the firewall.
Question 4
What works closely with FortiGate next-generation firewall products to provide the
highest level of network security?
Select one:
Gartner
RFCs
FortiGuard Labs [CORRECT ANSWER]
NSS Labs
Question 5
In network security, what is the purpose of a firewall?
Select one:
To limit the number of users on the network
To control the flow of network traffic [CORRECT ANSWER]
To prevent authorized users from accessing corporate servers
To prevent unauthorized USB devices from being plugged in to a user’s endpoint
ATTEMPT #2
Question 3
With the explosion of the World Wide Web, the composition of network protocols
skewed heavily towards HTTP. What challenge did this shift pose to legacy
firewalls?
Select one:
Different web applications used the same HTTP port number, making it difficult for
firewalls to distinguish between applications. [CORRECT ANSWER]
HTTP was an application layer protocol that relied heavily on TCP.
Firewalls did not have visibility into HTTP ports.
HTTP request methods were too complex and diverse.