OFFICIAL LINK TO APPLY FOR THIS QUIZ : CLICK HERE
Question 1: What are spam filters?
- Filters that send automated responses to the sender
- Filters that scan the network for the presence of malware
- A network component that strengthens the authentication method
- Filters that identify specific words or patterns in email messages in order to validate the content of those messages
Question 2: What are two characteristics of FortiMail? (Choose two.)
- FortiMail is a next-generation firewall (NGFW).
- FortiMail is a secure email gateway (SEG).
- FortiMail is a sandboxing solution.
- FortiMail integrates with firewalls and sandboxing solutions.
Question 3: What are three benefits of FortiMail? (Choose three.)
- FortiMail identifies spam and phishing emails.
- FortiMail filters outgoing traffic to protect valuable data.
- FortiMail integrates with FortiSandbox to identify advanced threats.
- FortiMail provides caching and video stream splitting.
Question 4: What is phishing?
- The process of installing a fake firewall instance on the network
- The process of scanning for network vulnerabilities
- The practice of changing user credentials
- The practice of tricking unsuspecting people into revealing sensitive information or to handing over money
Question 5: For which two reasons do you need to deploy Sender Policy Framework (SPF)? (Choose two.)
- SPF scans only the network traffic, and it became a standard in 2014.
- SPF is able to stop unknown threats; firewalls cannot.
- SPF is an email authentication method that detects fake sender addresses and emails.
- SPF secures the network by strengthening the authentication method.
Question 6: Which feature can be added to secure email gateway?
- Data leak prevention (DLP)
- Distributed leak prevention (DLP)
- Data level protection (DLP)
- Data storage processing (DSP)
Question 7: What are two benefits of FortiMail integration? (Choose two.)
- FortiMail can be integrated with segmentation firewalls.
- FortiMail does not need to be centrally managed.
- FortiMail does not need to be continually updated.
- FortiMail can be integrated with edge firewalls.
Question 8: Which technique used by a threat actor is known as spam?
Select one:
- Weaponized emails that claim to come from a legitimate sender
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
- Fraudulent messages that target a specific role or person within an organization
- An attacker observes websites that a targeted group visits, and herds them into an infected website
Question 9: Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)
Select one or more:
- An infected thumb drive
- An attachment to an email
- Click bait
- An embedded hyperlink within an email
Question 10: Which technique used by threat actors is known as phishing?
Select one:
- An attacker observes websites that a targeted group visits, and herds them into an infected website
- A fraudulent practice of sending emails purporting to be reputable in order to steal information
- Fraudulent messages that target a specific role or person within an organization
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
Question 11: Which option identifies the trend of phishing?
Select one:
- Plateaued
- Erratic
- Declining
- Increasing
Question 12: Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?
Select one:
- Volume of attacks
- Delay in implementing the sender policy framework
- Success of click-bait
- Data loss
Question 13: Which method did the earliest spam filter use to stop spam?
Select one:
- Detected unusual behaviour
- Detected illegitimate email addresses
- Identified specific words or patterns
- Tested emails in a sandbox environment
Question 14: In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)
Select one or more:
- Email emulator
- Antivirus scanner
- Sandbox
- Firewall