This is the "bread and butter" and the start of Fortinet began with this device
Fortigate
This fortinet device collects, correlates and can create security automation playbooks tied to the Fortigate through automation stitches.
FortiAnalyzer
To protect sensitive client data while working in public spaces like coffee shops or airports, AMs should use this tool to create an encrypted "tunnel" for their internet connection.
VPN (Forticlient)
In what year did Artemis II launch from Kennedy Space Center
LAST WEEK! 2026
Fabric Telemetry utilizes this port.
TCP 8013
A Fortinet tool to manage all network devices off of a single virtual machine or cloud instance.
FortiManager
I can create a fake Active Directory servers and monitor attacks coming into the fake decoy using this product
FortiDeceptor
This term refers to malicious software designed to block access to a computer system or files until a sum of money is paid, often starting with a single hijacked AM account.
Ransomware (FortiEDR, In-line Sandbox)
In What year did FIFA world cup start?
1930
This specific type of VPN tunnel encapsulates traffic using an IP header but provides no encryption or authentication on its own.
GRE Tunnel
This Fortinet proprietary technology is used for connecting switches and access points to a Fortigate
FortiLink
Security teams that usually have few in number and are early on in their SOC maturity, could take advantage of this Fortinet managed service.
SoCaaS
This "Zero Trust" principle states that an employee should only have access to the specific data and systems necessary to perform their job, and nothing more.
Principal of Least Privilege
This ancient civilization, used Mouse brains for toothpaste.
The Roman Empire
This protocol uses port 1812 for authentication and port 1813 for accounting to manage network access for users
What is RADIUS
This technology allows clients to establish connectivity based on a security posture check
ZTNA or ZTNA Tags
These two products help establish IAM either centralized or through a specific privilege that is set by that tool that could be recorded via video.
FortiAuthenticator and FortiPAM
This is a specific type of attack where a hacker intercepts and potentially alters communication between an AM and a client without either party knowing.
Man in the Middle Attack
This was the world's first convenience store that opened in Dallas in 1927.
7-Eleven
What is the DIRTY flag signal in a session from the Fortigate command line. (ie. diag sys session)
Needs to be re-inspected
This technology allows a customer to create connections into other Fortinet products within our ecosystem.
Fortinet Security Fabric connector
I want to take malware and detnotate it separately and be able to visually see it be executed in a virtual recorded environment using this product. It can also tie into the Fortigate as an inline service.
FortiSandbox
In cybersecurity insurance and law, this term describes the "reasonable steps" their company must take to protect client data to avoid being held liable for a breach.
Your fearless leader, grand musician, Sean Brockette was in a band back when the hair was darker, and the face was younger. What was the name of this band?
Tasty
What troubleshooting command is used for identifying each step of the traffic processing, such as gateway selection, policy ID used, authentication passed, etc.
diag debug flow