Network Security
Security OPS
CyberSecurity
Random Facts
SE's Only
100

This is the "bread and butter" and the start of Fortinet began with this device

Fortigate

100

This fortinet device collects, correlates and can create security automation playbooks tied to the Fortigate through automation stitches. 

FortiAnalyzer

100

To protect sensitive client data while working in public spaces like coffee shops or airports, AMs should use this tool to create an encrypted "tunnel" for their internet connection.

VPN (Forticlient)

100

In what year did Artemis II launch from Kennedy Space Center

LAST WEEK! 2026

100

Fabric Telemetry utilizes this port. 

TCP 8013

200

A Fortinet tool to manage all network devices off of a single virtual machine or cloud instance.

FortiManager

200

I can create a fake Active Directory servers and monitor attacks coming into the fake decoy using this product

FortiDeceptor

200

This term refers to malicious software designed to block access to a computer system or files until a sum of money is paid, often starting with a single hijacked AM account.

Ransomware (FortiEDR, In-line Sandbox)

200

In What year did FIFA world cup start?

1930

200

This specific type of VPN tunnel encapsulates traffic using an IP header but provides no encryption or authentication on its own.

GRE Tunnel

300

This Fortinet proprietary technology is used for connecting switches and access points to a Fortigate

FortiLink

300

Security teams that usually have few in number and are early on in their SOC maturity, could take advantage of this Fortinet managed service. 

SoCaaS

300

This "Zero Trust" principle states that an employee should only have access to the specific data and systems necessary to perform their job, and nothing more.

Principal of Least Privilege 

300

This ancient civilization, used Mouse brains for toothpaste.

The Roman Empire

300

This protocol uses port 1812 for authentication and port 1813 for accounting to manage network access for users

What is RADIUS

400

This technology allows clients to establish connectivity based on a security posture check

ZTNA or ZTNA Tags

400

These two products help establish IAM either centralized or through a specific privilege that is set by that tool that could be recorded via video.

FortiAuthenticator and FortiPAM

400

This is a specific type of attack where a hacker intercepts and potentially alters communication between an AM and a client without either party knowing.

Man in the Middle Attack

400

This was the world's first convenience store that opened in Dallas in 1927.

7-Eleven

400

What is the DIRTY flag signal in a session from the Fortigate command line. (ie. diag sys session)

Needs to be re-inspected 

500

This technology allows a customer to create connections into other Fortinet products within our ecosystem.

Fortinet Security Fabric connector

500

I want to take malware and detnotate it separately and be able to visually see it be executed in a virtual recorded environment using this product. It can also tie into the Fortigate as an inline service. 

FortiSandbox

500

In cybersecurity insurance and law, this term describes the "reasonable steps" their company must take to protect client data to avoid being held liable for a breach.

"Due Diligence" 
500

Your fearless leader, grand musician, Sean Brockette was in a band back when the hair was darker, and the face was younger. What was the name of this band?

Tasty

500

What troubleshooting command is used for identifying each step of the traffic processing, such as gateway selection, policy ID used, authentication passed, etc. 

diag debug flow

M
e
n
u