Fortinet Getting Started in Cybersecurity Secure Email Gateway Quiz Answers

Lesson 05: Secure Email Gateway Quiz Answers

Question: Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)

  • Click bait
  • An infected thumb drive
  • An embedded hyperlink within an email
  • An attachment to an email

Question: In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)

  • Email emulator
  • Sandbox
  • Antivirus scanner
  • Firewall

Question: Which option identifies the trend of email spamming and phishing?

  • Increasing
  • Erratic
  • Declining
  • Plateaued

Question: Which technique used by a threat actor is known as phishing?

  • Fraudulent messages that target a specific role or person within an organization
  • A fraudulent practice of sending emails purporting to be reputable in order to steal personal information
  • Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
  • An attacker observes websites that a targeted group visits, and herds them into an infected website

Question: Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?

  • Success of click-bait
  • Volume of attacks
  • Data loss
  • Delay in implementing the sender policy framework

Question: Which technique used by a threat actor is known as spam?

  • Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
  • An attacker observes websites that a targeted group visits, and herds them into an infected website
  • Fraudulent messages that target a specific role or person within an organization
  • Weaponized emails that claim to come from a legitimate sender

Question: Which method did the earliest spam filter use to stop spam?

  • Identified specific words or patterns
  • Detected illegitimate email addresses
  • Detected unusual behaviour
  • Tested emails in a sandbox environment

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.