Secure Email Gateway Quiz Answers NSE 2

Secure Email Gateway Quiz Answers NSE 2

Secure Email Gateway Quiz Answers NSE 2
Fig 1: Secure Email Gateway Quiz Answers NSE 2


 Question 1: What are spam filters?

·         Filters that send automated responses to the sender

·         Filters that scan the network for the presence of malware

·         A network component that strengthens the authentication method

·         Filters that identify specific words or patterns in email messages in order to validate the content of those messages

Question 2: What are two characteristics of FortiMail? (Choose two.)

·         FortiMail is a next-generation firewall (NGFW).

·         FortiMail is a secure email gateway (SEG).

·         FortiMail is a sandboxing solution.

·         FortiMail integrates with firewalls and sandboxing solutions.

Question 3: What are three benefits of FortiMail? (Choose three.)

·         FortiMail identifies spam and phishing emails.

·         FortiMail filters outgoing traffic to protect valuable data.

·         FortiMail integrates with FortiSandbox to identify advanced threats.

·         FortiMail provides caching and video stream splitting.

Question 4: What is phishing?

·         The process of installing a fake firewall instance on the network

·         The process of scanning for network vulnerabilities

·         The practice of changing user credentials

·         The practice of tricking unsuspecting people into revealing sensitive information or to handing over money

Question 5: For which two reasons do you need to deploy Sender Policy Framework (SPF)? (Choose two.)

·         SPF scans only the network traffic, and it became a standard in 2014.

·         SPF is able to stop unknown threats; firewalls cannot.

·         SPF is an email authentication method that detects fake sender addresses and emails.

·         SPF secures the network by strengthening the authentication method.

Question 6: Which feature can be added to secure email gateway?

·         Data leak prevention (DLP)

·         Distributed leak prevention (DLP)

·         Data level protection (DLP)

·         Data storage processing (DSP)

Question 7: What are two benefits of FortiMail integration? (Choose two.)

·         FortiMail can be integrated with segmentation firewalls.

·         FortiMail does not need to be centrally managed.

·         FortiMail does not need to be continually updated.

·         FortiMail can be integrated with edge firewalls.

Question 8 : Which technique used by a threat actor is known as spam?

Select one:

·         Weaponized emails that claim to come from a legitimate sender

·         Irrelevant or inappropriate messages sent on the Internet to a large number of recipients

·         Fraudulent messages that target a specific role or person within an organization

·         An attacker observes websites that a targeted group visits, and herds them into an infected website

Question 9: Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)

Select one or more:

·         An infected thumb drive

·         An attachment to an email

·         Click bait

·         An embedded hyperlink within an email

Question 10: Which technique used by threat actors is known as phishing?

Select one:

·         An attacker observes websites that a targeted group visits, and herds them into an infected website

·         A fraudulent practice of sending emails purporting to be reputable in order to steal information

·         Fraudulent messages that target a specific role or person within an organization

·         Irrelevant or inappropriate messages sent on the Internet to a large number of recipients

Question 11 : Which option identifies the trend of phishing?

Select one:

·         Plateaued

·         Erratic

·         Declining

·         Increasing

Question 12 : Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?

Select one:

·         Volume of attacks

·         Delay in implementing the sender policy framework

·         Success of click-bait

·         Data loss

Question 13 : Which method did the earliest spam filter use to stop spam?

Select one:

·         Detected unusual behaviour

·         Detected illegitimate email addresses

·         Identified specific words or patterns

·         Tested emails in a sandbox environment

Question 14 : In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)

Select one or more:

·         Email emulator

·         Antivirus scanner

·         Sandbox

·         Firewall

 

Post a Comment

0 Comments