Internet Threat Perspectives Quiz Answers NSE 1
This post contains the quiz answers of Internet Threat
Perspectives Quiz Answers NSE 1 Information Security Awareness Fortinet. We
are applying for NSE 1 Information Security Awareness Fortinet Certification.
It contains 5 lesson out of which lesson 4 answers are mentioned here, please
find the apply link below:
Lesson 4—Internet
Threat Perspectives
In the Internet Threat Perspectives lesson, you
learn about how new technologies have expanded the attack surface, the myriad
of social engineering techniques employed by the bad actors, and best practices
for keeping yourself safe while navigating the internet.
Question 1: Select two good travelling habits for protecting your
portable device. (Choose two.)
·
Avoid joining unknown Wi-Fi networks
·
Join only Wi-Fi networks from recognizable brands, such as
Starbucks
·
Turn off automatic security software updates
·
Encrypt all sensitive data
Question 2: You receive an email from your bank. It states that
someone has your password and that you must take immediate action by clicking
the link provided. What should you do?
·
Click the link and change your password. Time is of the essence.
·
Scour the email for spelling mistakes. If there are none, then
the email is legitimate and you can click the link.
·
Delete and report it to the bank by using the
contact information found on their website.
·
Reply to the email to confirm that they have the correct account
by providing your bank account number.
Question 3: Which precaution should you take if you receive an
email that involves the movement of money, such as the payment of an invoice,
even if it is from someone you know?
·
Pay it immediately to avoid late fees.
·
Look for spelling mistakes in the email. If you find any, delete
the email. It’s obviously a scam.
·
Reply to the email and ask them to provide proof of their
identity.
·
Use another form of trusted communication to
verify that the message is legitimate.
Question 4: Which three of the following activities represents
data vulnerabilities on a mobile device. (Choose three.)
·
Synchronization between computers and mobile
devices
·
Creating contacts
·
Listening to music
·
Banking
·
Social networking
Question 5: Which of the following is a good habit for
protecting your mobile device?
·
Change the factory-set default password and
username.
·
Test connectivity by doing online banking.
·
Configure your email accounts.
·
Set up a personal hotspot.
Question 6: Which is the number one infection vector for all
kinds of malware?
·
Text messages
·
Juice jacking
·
Web pages
·
Email
Question 7: Complete the sentence. A social engineering attack
that compromises public charging stations and installs malware when a portable
device plugs in, is known as
·
Phishing
·
Spearphishing
·
Ransomware
·
Juice Jacking
Question 8: Complete the sentence. Phishing attacks are
different than spearphishing, whaling, and vishing because they
·
involve hackers hanging out at internet forums who then collect
information about individuals to target, while the others are aimed at a wide
audience.
·
are directed against smaller players—small fish you might say,
while the others use social media sites.
·
are aimed at a wide audience, while the others
are directed toward individuals or specific organizations.
·
use social media and social engineering techniques to lure their
victims, while the others primary use email.
Question 9: Which three activities pose a potential security
threat to users? (Choose three.)
·
Reading an online journal from a public library computer
·
Using your own portable charger in a public place
·
Doing your banking on your laptop from a
friend’s secured home network
·
Connecting as a guest on an organization’s
Wi-Fi network
·
Connecting your device to a public, wireless
hotspot to pay for a rental car
0 Comments