Thanks for Visiting my channel
Fortinet Getting Started in Cybersecurity Secure Email Gateway Quiz Answers
Lesson 05: Secure Email Gateway Quiz Answers
Question: Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)
Click bait
An infected thumb drive
An embedded hyperlink within an email
An attachment to an email
Question: In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)
Email emulator
Sandbox
Antivirus scanner
Firewall
Question: Which option identifies the trend of email spamming and phishing?
Increasing
Erratic
Declining
Plateaued
Question: Which technique used by a threat actor is known as phishing?
Fraudulent messages that target a specific role or person within an organization
A fraudulent practice of sending emails purporting to be reputable in order to steal personal information
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
An attacker observes websites that a targeted group visits, and herds them into an infected website
Question: Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?
Success of click-bait
Volume of attacks
Data loss
Delay in implementing the sender policy framework
Question: Which technique used by a threat actor is known as spam?
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
An attacker observes websites that a targeted group visits, and herds them into an infected website
Fraudulent messages that target a specific role or person within an organization
Weaponized emails that claim to come from a legitimate sender
Question: Which method did the earliest spam filter use to stop spam?
Identified specific words or patterns
Detected illegitimate email addresses
Detected unusual behaviour
Tested emails in a sandbox environment
Question 1: What are spam filters?
Filters that send automated responses to the sender
Filters that scan the network for the presence of malware
A network component that strengthens the authentication method
Filters that identify specific words or patterns in email messages in order to validate the content of those messages
Question 2: What are two characteristics of FortiMail? (Choose two.)
FortiMail is a next-generation firewall (NGFW).
FortiMail is a secure email gateway (SEG).
FortiMail is a sandboxing solution.
FortiMail integrates with firewalls and sandboxing solutions.
Question 3: What are three benefits of FortiMail? (Choose three.)
FortiMail identifies spam and phishing emails.
FortiMail filters outgoing traffic to protect valuable data.
FortiMail integrates with FortiSandbox to identify advanced threats.
FortiMail provides caching and video stream splitting.
Question 4: What is phishing?
The process of installing a fake firewall instance on the network
The process of scanning for network vulnerabilities
The practice of changing user credentials
The practice of tricking unsuspecting people into revealing sensitive information or to handing over money
Question 5: For which two reasons do you need to deploy Sender Policy Framework (SPF)? (Choose two.)
SPF scans only the network traffic, and it became a standard in 2014.
SPF is able to stop unknown threats; firewalls cannot.
SPF is an email authentication method that detects fake sender addresses and emails.
SPF secures the network by strengthening the authentication method.
Question 6: Which feature can be added to secure email gateway?
Data leak prevention (DLP)
Distributed leak prevention (DLP)
Data level protection (DLP)
Data storage processing (DSP)
Question 7: What are two benefits of FortiMail integration? (Choose two.)
FortiMail can be integrated with segmentation firewalls.
FortiMail does not need to be centrally managed.
FortiMail does not need to be continually updated.
FortiMail can be integrated with edge firewalls.
No comments:
Post a Comment