0% found this document useful (0 votes)
495 views3 pages

FCF - Getting Started in Cybersecurity 2.0 Self-Paced Completed Quiz - Secure Email Gateway (Achieved Pass Grade) Quiz - Secure Email Gateway

Uploaded by

Leandro C
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
495 views3 pages

FCF - Getting Started in Cybersecurity 2.0 Self-Paced Completed Quiz - Secure Email Gateway (Achieved Pass Grade) Quiz - Secure Email Gateway

Uploaded by

Leandro C
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Quiz - Secure Email Gateway: Attempt review https://training.fortinet.com/mod/quiz/review.php?attempt=20826746&...

1 de 3 26/12/2024, 15:52
Quiz - Secure Email Gateway: Attempt review https://training.fortinet.com/mod/quiz/review.php?attempt=20826746&...

The Fortinet Training Institute will undergo maintenance from Dec. 27, 2024, 8 AM EST to Dec. 28, 2024, 10 AM EST, with up to 1 hour of
downtime expected. The site will remain available during the migration.

FCF - Getting Started in Cybersecurity 2.0 Self-Paced


Started on Thursday, December 26, 2024, 1:01 PM
State Finished
Completed on Thursday, December 26, 2024, 6:52 PM
Time taken 5 hours 50 mins
Points 5/5
Grade 100 out of 100
Feedback Congratulations, you passed!

Question 1
Correct

1 points out of 1

In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)

Select one or more:


Antivirus scanner
Firewall
Sandbox
Email emulator

Question 2
Correct

1 points out of 1

Which technique used by a threat actor is known as phishing?

Select one:
Fraudulent messages that target a specific role or person within an organization
An attacker observes websites that a targeted group visits, and herds them into an infected website
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
A fraudulent practice of sending emails purporting to be reputable in order to steal personal information

Question 3
Correct

1 points out of 1

Which technique used by a threat actor is known as spam?

Select one:
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
Weaponized emails that claim to come from a legitimate sender
Fraudulent messages that target a specific role or person within an organization
An attacker observes websites that a targeted group visits, and herds them into an infected website

2 de 3 26/12/2024, 15:52
Quiz - Secure Email Gateway: Attempt review https://training.fortinet.com/mod/quiz/review.php?attempt=20826746&...

An attacker observes websites that a targeted group visits, and herds them into an infected website

Question 4
Correct

1 points out of 1

Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?

Select one:
Delay in implementing the sender policy framework
Volume of attacks
Success of click-bait
Data loss

Question 5
Correct

1 points out of 1

Which option identifies the trend of email spamming and phishing?

Select one:
Erratic
Increasing
Declining
Plateaued

3 de 3 26/12/2024, 15:52

You might also like