Images
AI
Cloud
Fortinet
SecOps
100

What are the 5 security risks here?

1. Password on a Sticky Note

2. Tripping Hazard / Infrastructure Risk

3. Unattended, Unlocked Screen

4. Data in the Trash

5. Whiteboards/Exposed Intellectual Property with confidential data

100

What term describes employees using AI tools without security or IT approval?

  • Shadow AI

100

Name at least two cloud service models?

IaaS, PaaS, SaaS

100

Which one of FortiGate-600 in not announced EoO

FG-600E/FG-601E

100

What SecOps capability focuses on collecting and correlating logs from multiple security tools to detect threats?

SIEM (Security Information and Event Management)

200

Find 5 security risks in the image below



200

Which type of attack manipulates an AI model by crafting malicious instructions inside user inputs?

Prompt Injection

200

What is the most sold Fortinet product on the Cloud?

Fortinet NG VM

200

A Firewall feature that provides Continuous compromise monitoring to detect signs of intrusion, tampering or lateral movement in real time.

FortiSentry

200

This security practice involves monitoring user behavior to detect insider threats and compromised accounts.

User and Entity Behavior Analytics (UEBA)

300

1. The Password Sticky Note

2. Ransomware/Phishing Infection

3. Exposed ID Badges

4. Password Safety Rules on the wall

5. Data in the Trash (should be shredded)


300

How can GenAI increase phishing risks?

By generating highly personalized, convincing phishing messages at scale.

300

What are the common reasons to Adopt cloud? Name 3

Faster Innovation, Financial linearity, Elasticity, Easier App Modernization

300

What is LLM?

Large Language model


300

Which framework is most commonly used by SOC teams to map detections and adversary behavior during investigations?

MITRE ATT&CK

400

List the 4 indicators that would tell the user this is a phishing email

1. The email comes from security@bank-updates.com. Real banks typically use their main domain.

2. Generic Greeting & Poor Grammar

3. Mismatched/Suspicious URL: The link shown is securelogin-bank-update.com/verify. A real bank link would be hosted on their official, verified website.

4. Extreme Urgency & Threats


400

What security control helps prevent confidential data from being submitted to GenAI prompts?

Data Loss Prevention (DLP)

400

Is security natively enforced on the cloud? and Why?

Cloud attack surface is much wider, shared responsibility model

400

What is CIA in information security means?

Confidentiality, Integrity, and Availability

400

This term describes how long an attacker operates inside a network before being discovered

Dwell time

500

Spot the 4 security risks in the image below:

1. Tailgating / Unauthorized Entry

2. Publicly Displayed Wi-Fi Credentials

3. Administrative Password Leak

4. Physical Key Security (Unattended keys)

500

Why are “shadow AI” tools dangerous in enterprises?

They bypass security controls, compliance, and data governance policies.

500

What are the common cloud security problems?

Misconfigured firewall rules(or even lack of NG firewall), too broadly granted IAM, too flat application architecture, no ability to detect rogue logins

500

A customer calls you telling you he has an issue and he just opened a ticket and he needs immediate response. What is the best thing to do?

Ask the customer (Gently) to call Fortinet TAC support and request for immediate assistance


500

This security exercise simulates real attackers to test an organization’s defenses.

red teaming

600

The "O" in fortinet logo is split into how many chunks?

8

600

What is the biggest security challenge when integrating GenAI into SOC workflows?

Ensuring data privacy, output accuracy, and preventing hallucination.


600

Name what Fortinet products are being used on a Cloud Landing Zone

Fortigate VM, FortiWeb, Forti Analyzer, Forti Manager

600

An important internally tool that helps you to sell more Security Fabric?

Replicable Use Case Knowledge-Base (RUCK)

600

What key metric does SecOps aim to reduce to demonstrate operational effectiveness to CISOs?

MTTD and MTTR (Mean Time to Detect and Mean Time to Respond)


M
e
n
u