[Certification]/[FCF] Fortinet Certified Fundamentals

[FCF] Threat Landscape - Module 3 : Quesion&Answer

starterr 2024. 5. 4. 18:18

Q. Which attack vector does an influence campaign rely upon?
Select one:

- Messaging service
- Zero-trust software exploit
- Email
- Social media


Q. Which threat indicator could be an indication of an active insider threat?
Select one:

- An open pot of honey is suspiciously left on a kitchen countertop
- An employee shows contempt for an organization’s policies
- A USB drive is found abandoned in an organization’s parking lot
- Two employees disagree on the interpretation of a security policy


Q. Which technique most accurately describes social engineering?
Select one:

- Psychological manipulation
- Zero-day attack
- Quid pro quo
- Exploiting computer weaknesses

반응형



Q. Which description best explains pharming?
Select one:

- Cultivating trust between a bad actor and the target through chance encounters
- Recruiting employees through various means to carry out an insider attack
- Exploiting an unknown vulnerability in computer software
- Computer traffic redirected from a legitimate website to a malicious one


Q. Which attack method relies on a telephone or voice-over-IP to target individuals or small groups, such as members of a finance department?
Select one:

- Smishing
- Vishing
- Whaling
- Honeypot


Q. What objective is accomplished by the last two stages of an influence campaign?
Select one:

- Theft of information or money
- Amplification of the message
- Access to the target’s network
- Clarification of the narrative

 

Q. What type of insider threat is an individual who believes they are exempt from their organization’s security policies and bypasses them?
Select one:

- Collaborator
- Lone wolf
- Pawn
- Goof


Q. Which two insider types are considered malicious insider threats? (Choose two.)
Select one or more:

- Rats
- Lone wolves
- Pawns
- Moles

 

[FCF] Threat Landscape - Module 2 : The Threat Landscape (위협 환경)

 

[FCF] Threat Landscape - Module 2 : The Threat Landscape (위협 환경)

A. 위협 환경1. 위협 환경(Threat Landscape)이란? 위협 환경은 특정 컨텍스트 또는 도메인의 위협 모음이며 위협의 가해자, 즉 악의적인 행위자(Bad Actors)에 대한 정보를 포함합니다. 사이버 보안의

infoofit.tistory.com

 

[FCF] Threat Landscape - Module 3 : Social Engineering (사회 공학)

 

[FCF] Threat Landscape - Module 3 : Social Engineering (사회 공학)

A. 사회 공학1. 사회 공학(Social Engineering)이란?정보 보안의 맥락에서 이해하면, 이는 종종 표적을 희생시키면서 이익을 얻기 위해 사람들을 조종하는 행위를 뜻 합니다. 이는 인간의 감정을 활

infoofit.tistory.com

 

 

 

 

반응형