Friday , March 1 2024
Breaking News

Secure Email Gateway Quiz Answers NSE 2 Information Security Awareness Fortinet

Question 1: What are spam filters?

  • Filters that send automated responses to the sender
  • Filters that scan the network for the presence of malware
  • A network component that strengthens the authentication method
  • Filters that identify specific words or patterns in email messages in order to validate the content of those messages

Question 2: What are two characteristics of FortiMail? (Choose two.)

  • FortiMail is a next-generation firewall (NGFW).
  • FortiMail is a secure email gateway (SEG).
  • FortiMail is a sandboxing solution.
  • FortiMail integrates with firewalls and sandboxing solutions.

Question 3: What are three benefits of FortiMail? (Choose three.)

  • FortiMail identifies spam and phishing emails.
  • FortiMail filters outgoing traffic to protect valuable data.
  • FortiMail integrates with FortiSandbox to identify advanced threats.
  • FortiMail provides caching and video stream splitting.

Question 4: What is phishing?

  • The process of installing a fake firewall instance on the network
  • The process of scanning for network vulnerabilities
  • The practice of changing user credentials
  • The practice of tricking unsuspecting people into revealing sensitive information or to handing over money

Question 5: For which two reasons do you need to deploy Sender Policy Framework (SPF)? (Choose two.)

  • SPF scans only the network traffic, and it became a standard in 2014.
  • SPF is able to stop unknown threats; firewalls cannot.
  • SPF is an email authentication method that detects fake sender addresses and emails.
  • SPF secures the network by strengthening the authentication method.

Question 6: Which feature can be added to secure email gateway?

  • Data leak prevention (DLP)
  • Distributed leak prevention (DLP)
  • Data level protection (DLP)
  • Data storage processing (DSP)

Question 7: What are two benefits of FortiMail integration? (Choose two.)

  • FortiMail can be integrated with segmentation firewalls.
  • FortiMail does not need to be centrally managed.
  • FortiMail does not need to be continually updated.
  • FortiMail can be integrated with edge firewalls.

Question 8 : Which technique used by a threat actor is known as spam?

Select one:

  • Weaponized emails that claim to come from a legitimate sender
  • Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
  • Fraudulent messages that target a specific role or person within an organization
  • An attacker observes websites that a targeted group visits, and herds them into an infected website

Question 9: Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)

Select one or more:

  • An infected thumb drive
  • An attachment to an email
  • Click bait
  • An embedded hyperlink within an email

Question 10: Which technique used by threat actors is known as phishing?

Select one:

  • An attacker observes websites that a targeted group visits, and herds them into an infected website
  • A fraudulent practice of sending emails purporting to be reputable in order to steal information
  • Fraudulent messages that target a specific role or person within an organization
  • Irrelevant or inappropriate messages sent on the Internet to a large number of recipients

Question 11 : Which option identifies the trend of phishing?

Select one:

  • Plateaued
  • Erratic
  • Declining
  • Increasing

Question 12 : Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?

Select one:

  • Volume of attacks
  • Delay in implementing the sender policy framework
  • Success of click-bait
  • Data loss

Question 13 : Which method did the earliest spam filter use to stop spam?

Select one:

  • Detected unusual behaviour
  • Detected illegitimate email addresses
  • Identified specific words or patterns
  • Tested emails in a sandbox environment

Question 14 : In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)

Select one or more:

  • Email emulator
  • Antivirus scanner
  • Sandbox
  • Firewall

OFFICIAL LINK TO APPLY FOR THIS QUIZ : CLICK HERE

About Clear My Certification

Check Also

FORTINET NSE 3 Product Awareness Exam Answers

FORTINET NSE 3 Product Awareness Exam Answers Description This course introduces you to the key …

Leave a Reply

Your email address will not be published. Required fields are marked *