Secure Email Gateway Quiz Answers NSE 2
·
Filters that send automated responses to the sender
·
Filters that scan the network for the presence of malware
·
A network component that strengthens the authentication method
·
Filters that identify specific words or
patterns in email messages in order to validate the content of those messages
Question 2: What are two characteristics of FortiMail? (Choose
two.)
·
FortiMail is a next-generation firewall (NGFW).
·
FortiMail is a secure email gateway (SEG).
·
FortiMail is a sandboxing solution.
·
FortiMail integrates with firewalls and
sandboxing solutions.
Question 3: What are three benefits of FortiMail? (Choose
three.)
·
FortiMail identifies spam and phishing emails.
·
FortiMail filters outgoing traffic to protect
valuable data.
·
FortiMail integrates with FortiSandbox to
identify advanced threats.
·
FortiMail provides caching and video stream splitting.
Question 4: What is phishing?
·
The process of installing a fake firewall instance on the
network
·
The process of scanning for network vulnerabilities
·
The practice of changing user credentials
·
The practice of tricking unsuspecting people
into revealing sensitive information or to handing over money
Question 5: For which two reasons do you need to deploy Sender
Policy Framework (SPF)? (Choose two.)
·
SPF scans only the network traffic, and it became a standard in
2014.
·
SPF is able to stop unknown threats; firewalls cannot.
·
SPF is an email authentication method that
detects fake sender addresses and emails.
·
SPF secures the network by strengthening the
authentication method.
Question 6: Which feature can be added to secure email gateway?
·
Data leak prevention (DLP)
·
Distributed leak prevention (DLP)
·
Data level protection (DLP)
·
Data storage processing (DSP)
Question 7: What are two benefits of FortiMail integration?
(Choose two.)
·
FortiMail can be integrated with segmentation
firewalls.
·
FortiMail does not need to be centrally managed.
·
FortiMail does not need to be continually updated.
·
FortiMail can be integrated with edge
firewalls.
Question 8 : Which technique used by a threat actor is known as
spam?
Select one:
·
Weaponized emails that claim to come from a legitimate sender
·
Irrelevant or inappropriate messages sent on
the Internet to a large number of recipients
·
Fraudulent messages that target a specific role or person within
an organization
·
An attacker observes websites that a targeted group visits, and
herds them into an infected website
Question 9: Which two methods are used by threat actors to
compromise your device when conducting phishing campaigns? (Choose two.)
Select one or more:
·
An infected thumb drive
·
An attachment to an email
·
Click bait
·
An embedded hyperlink within an email
Question 10: Which technique used by threat actors is known as
phishing?
Select one:
·
An attacker observes websites that a targeted group visits, and
herds them into an infected website
·
A fraudulent practice of sending emails
purporting to be reputable in order to steal information
·
Fraudulent messages that target a specific role or person within
an organization
·
Irrelevant or inappropriate messages sent on the Internet to a
large number of recipients
Question 11 : Which option identifies the trend of phishing?
Select one:
·
Plateaued
·
Erratic
·
Declining
·
Increasing
Question 12 : Which challenge caused secure email gateway (SEG)
to adopt automation and machine learning?
Select one:
·
Volume of attacks
·
Delay in implementing the sender policy framework
·
Success of click-bait
·
Data loss
Question 13 : Which method did the earliest spam filter use to
stop spam?
Select one:
·
Detected unusual behaviour
·
Detected illegitimate email addresses
·
Identified specific words or patterns
·
Tested emails in a sandbox environment
Question 14 : In addition to a spam filter, which two
technologies are often a part of secure email gateway (SEG)? (Choose two.)
Select one or more:
·
Email emulator
·
Antivirus scanner
·
Sandbox
·
Firewall
0 Comments