What are the 5 security risks here?

1. Password on a Sticky Note
2. Tripping Hazard / Infrastructure Risk
3. Unattended, Unlocked Screen
4. Data in the Trash
5. Whiteboards/Exposed Intellectual Property with confidential data
What term describes employees using AI tools without security or IT approval?
Shadow AI
Name at least two cloud service models?
IaaS, PaaS, SaaS
Which one of FortiGate-600 in not announced EoO
FG-600E/FG-601E
What SecOps capability focuses on collecting and correlating logs from multiple security tools to detect threats?
SIEM (Security Information and Event Management)
Find 5 security risks in the image below


Which type of attack manipulates an AI model by crafting malicious instructions inside user inputs?
Prompt Injection
What is the most sold Fortinet product on the Cloud?
Fortinet NG VM
A Firewall feature that provides Continuous compromise monitoring to detect signs of intrusion, tampering or lateral movement in real time.
FortiSentry
This security practice involves monitoring user behavior to detect insider threats and compromised accounts.
User and Entity Behavior Analytics (UEBA)

1. The Password Sticky Note
2. Ransomware/Phishing Infection
3. Exposed ID Badges
4. Password Safety Rules on the wall
5. Data in the Trash (should be shredded)
How can GenAI increase phishing risks?
By generating highly personalized, convincing phishing messages at scale.
What are the common reasons to Adopt cloud? Name 3
Faster Innovation, Financial linearity, Elasticity, Easier App Modernization
What is LLM?
Large Language model
Which framework is most commonly used by SOC teams to map detections and adversary behavior during investigations?
MITRE ATT&CK
List the 4 indicators that would tell the user this is a phishing email 
1. The email comes from security@bank-updates.com. Real banks typically use their main domain.
2. Generic Greeting & Poor Grammar
3. Mismatched/Suspicious URL: The link shown is securelogin-bank-update.com/verify. A real bank link would be hosted on their official, verified website.
4. Extreme Urgency & Threats
What security control helps prevent confidential data from being submitted to GenAI prompts?
Data Loss Prevention (DLP)
Is security natively enforced on the cloud? and Why?
Cloud attack surface is much wider, shared responsibility model
What is CIA in information security means?
Confidentiality, Integrity, and Availability
This term describes how long an attacker operates inside a network before being discovered
Dwell time
Spot the 4 security risks in the image below:
1. Tailgating / Unauthorized Entry
2. Publicly Displayed Wi-Fi Credentials
3. Administrative Password Leak
4. Physical Key Security (Unattended keys)
Why are “shadow AI” tools dangerous in enterprises?
They bypass security controls, compliance, and data governance policies.
What are the common cloud security problems?
Misconfigured firewall rules(or even lack of NG firewall), too broadly granted IAM, too flat application architecture, no ability to detect rogue logins
A customer calls you telling you he has an issue and he just opened a ticket and he needs immediate response. What is the best thing to do?
Ask the customer (Gently) to call Fortinet TAC support and request for immediate assistance
This security exercise simulates real attackers to test an organization’s defenses.
red teaming
The "O" in fortinet logo is split into how many chunks?
8

What is the biggest security challenge when integrating GenAI into SOC workflows?
Ensuring data privacy, output accuracy, and preventing hallucination.
Name what Fortinet products are being used on a Cloud Landing Zone
Fortigate VM, FortiWeb, Forti Analyzer, Forti Manager
An important internally tool that helps you to sell more Security Fabric?
Replicable Use Case Knowledge-Base (RUCK)
What key metric does SecOps aim to reduce to demonstrate operational effectiveness to CISOs?
MTTD and MTTR (Mean Time to Detect and Mean Time to Respond)