Types of Malware
General Cybersecurity
Networking with Firewalls
FortiAnalyzer
History of Fortinet
100

Named for how it makes its way through systems, this standalone malware spreads to other computers, often through network connections.

Worm

100

This type of cyberattack involves overwhelming a target with traffic to render it inaccessible to legitimate users.

DDoS (Distributed Denial-of-Service) attack

100

This foundational network model is divided into seven layers, including Physical, Data Link, and Application.

OSI Model

100

FortiAnalyzer’s primary function is to collect and manage these ____ of network and security events?

Logs, alerts, or records

100

Fortinet’s iconic firewall appliance series is named this, often abbreviated as FG

FortiGate

200

This malicious software locks users out of their data until they pay a fee, often in cryptocurrency.

Ransomware

200

According to this principle users and processes should have only the minimum capabilities necessary.

principle of least privilege

200

Firewalls typically filter traffic based on these numerical designations used to identify services and processes.

Port Numbers

200

FortiAnalyzer can automatically alert administrators to security incidents based on this type of predefined criteria?

Automated threat intelligence rules

200

This all-in-one security solution, launched by Fortinet, is known by the acronym UTM. 

Unified Threat Management

300

A seemingly benign program that hides malicious code, Also how the Greeks tricked their way into Troy.   

Trojan Horse

300

Often delivered through email attachments or downloads, this malicious software can replicate and spread by infecting other files.

Virus

300

This network deployment places a firewall between the internal network and a sub-network that hosts externally facing services, is often called a what?

DMZ or demilitarized zone. 

300

FortiAnalyzer integrates with what Fortinet cloud-based threat intelligence platform that continuously updates global threat data.

FortiGaurd

300

In 2000, Ken Xie and Michael Xie founded Fortinet in this high-tech region of California?

Silicon Valley

400

what creates a hidden entry point into a system, allowing attackers to gain remote access usually utilizing malware.

Backdoor

400

The process of converting readable information into an unreadable format to protect it during transmission is called what?

Encryption

400

A firewall that examines the entire context of a traffic flow, not just individual packets, is known as this type of firewall?

Stateful firewall

400

FortiAnalyzer can highlight suspicious network activity by using these automated methods that scan logs for known attack patterns?

Analytics and correlation rules (or automated threat intelligence rules)

400

In 2009, Fortinet went public and began trading on NASDAQ stock exchange, under what ticker symbol?
(This is an abbreviation)

FTNT

500

This form of malware hijacks a user’s system to secretly mine digital currency, consuming CPU and GPU resources.

Cryptojacking

500

This type of hidden or covert software bypasses normal authentication to gain elevated privileges or maintain access without being detected?

Rootkit

500

These specialized firewall deployments operate at a specific OSI level to inspect protocols like HTTP or SMTP for threats and anomalies.

Application-layer (or application-aware) firewall

500

For more flexible deployment, FortiAnalyzer can send data to multiple analytics nodes by applying what to ensure ensure redundancy and load balancing.

Policy-based log forwarding

500

Before founding Fortinet, Ken Xie launched NetScreen Technologies, later acquired by this company in 2004.

Juniper Networks

M
e
n
u