Lesson 5: Secure Email Gateway Quiz Answers
Question 1: Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)
- Click bait
- An infected thumb drive
- An embedded hyperlink within an email
- An attachment to an email
Question 2: In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)
- Email emulator
- Sandbox
- Antivirus scanner
- Firewall
Question 3: Which option identifies the trend of email spamming and phishing?
- Increasing
- Erratic
- Declining
- Plateaued
Question 4: Which technique used by a threat actor is known as phishing?
- Fraudulent messages that target a specific role or person within an organization
- A fraudulent practice of sending emails purporting to be reputable in order to steal personal information
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
- An attacker observes websites that a targeted group visits, and herds them into an infected website
Question 5: Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?
- Success of click-bait
- Volume of attacks
- Data loss
- Delay in implementing the sender policy framework
Question 6: Which technique used by a threat actor is known as spam?
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
- An attacker observes websites that a targeted group visits, and herds them into an infected website
- Fraudulent messages that target a specific role or person within an organization
- Weaponized emails that claim to come from a legitimate sender
Question 7: Which method did the earliest spam filter use to stop spam?
- Identified specific words or patterns
- Detected illegitimate email addresses
- Detected unusual behaviour
- Tested emails in a sandbox environment