Named for how it makes its way through systems, this standalone malware spreads to other computers, often through network connections.
Worm
This type of cyberattack involves overwhelming a target with traffic to render it inaccessible to legitimate users.
DDoS (Distributed Denial-of-Service) attack
This foundational network model is divided into seven layers, including Physical, Data Link, and Application.
OSI Model
FortiAnalyzer’s primary function is to collect and manage these ____ of network and security events?
Logs, alerts, or records
Fortinet’s iconic firewall appliance series is named this, often abbreviated as FG
FortiGate
This malicious software locks users out of their data until they pay a fee, often in cryptocurrency.
Ransomware
According to this principle users and processes should have only the minimum capabilities necessary.
principle of least privilege
Firewalls typically filter traffic based on these numerical designations used to identify services and processes.
Port Numbers
FortiAnalyzer can automatically alert administrators to security incidents based on this type of predefined criteria?
Automated threat intelligence rules
This all-in-one security solution, launched by Fortinet, is known by the acronym UTM.
Unified Threat Management
A seemingly benign program that hides malicious code, Also how the Greeks tricked their way into Troy.
Trojan Horse
Often delivered through email attachments or downloads, this malicious software can replicate and spread by infecting other files.
Virus
This network deployment places a firewall between the internal network and a sub-network that hosts externally facing services, is often called a what?
DMZ or demilitarized zone.
FortiAnalyzer integrates with what Fortinet cloud-based threat intelligence platform that continuously updates global threat data.
FortiGaurd
In 2000, Ken Xie and Michael Xie founded Fortinet in this high-tech region of California?
Silicon Valley
what creates a hidden entry point into a system, allowing attackers to gain remote access usually utilizing malware.
Backdoor
The process of converting readable information into an unreadable format to protect it during transmission is called what?
Encryption
A firewall that examines the entire context of a traffic flow, not just individual packets, is known as this type of firewall?
Stateful firewall
FortiAnalyzer can highlight suspicious network activity by using these automated methods that scan logs for known attack patterns?
Analytics and correlation rules (or automated threat intelligence rules)
In 2009, Fortinet went public and began trading on NASDAQ stock exchange, under what ticker symbol?
(This is an abbreviation)
FTNT
This form of malware hijacks a user’s system to secretly mine digital currency, consuming CPU and GPU resources.
Cryptojacking
This type of hidden or covert software bypasses normal authentication to gain elevated privileges or maintain access without being detected?
Rootkit
These specialized firewall deployments operate at a specific OSI level to inspect protocols like HTTP or SMTP for threats and anomalies.
Application-layer (or application-aware) firewall
For more flexible deployment, FortiAnalyzer can send data to multiple analytics nodes by applying what to ensure ensure redundancy and load balancing.
Policy-based log forwarding
Before founding Fortinet, Ken Xie launched NetScreen Technologies, later acquired by this company in 2004.
Juniper Networks