[Certification]/[FCF] Fortinet Certified Fundamentals

[FCF] Cybersecurity 2.0 - Lesson 05: Secure Email Gateway (Quesion&Answer)

starterr 2024. 5. 19. 15:26
반응형

Q. In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)
Select one or more:

- Email emulator
- Firewall
- Antivirus scanner
- Sandbox


Q. Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?
Select one:

- Volume of attacks
- Delay in implementing the sender policy framework
- Success of click-bait
- Data loss


Q. Which option identifies the trend of email spamming and phishing?
Select one:

- Declining
- Increasing
- Erratic
- Plateaued

 

반응형



Q. Which technique used by a threat actor is known as spam?
Select one:

- Weaponized emails that claim to come from a legitimate sender
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
- An attacker observes websites that a targeted group visits, and herds them into an infected website
- Fraudulent messages that target a specific role or person within an organization


Q.Which method did the earliest spam filter use to stop spam?
Select one:

- Detected unusual behaviour
- Tested emails in a sandbox environment
- Identified specific words or patterns
- Detected illegitimate email addresses


Q. Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)
Select one or more:

- An embedded hyperlink within an email
- An attachment to an email
- An infected thumb drive
- Click bait


Q. Which technique used by a threat actor is known as phishing?
Select one:

- A fraudulent practice of sending emails purporting to be reputable in order to steal personal information
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
- Fraudulent messages that target a specific role or person within an organization
- An attacker observes websites that a targeted group visits, and herds them into an infected website


Q. Which method did the earliest spam filter use to stop spam?
Select one:

- Detected unusual behaviour
- Tested emails in a sandbox environment
- Identified specific words or patterns
- Detected illegitimate email addresses

 

[FCF] Cybersecurity 2.0 - Lesson 05 : Secure Email Gateway(보안 이메일 게이트웨이)

 

[FCF] Cybersecurity 2.0 - Lesson 05 : Secure Email Gateway(보안 이메일 게이트웨이)

A. 보안 이메일 게이트 웨이 개요1. 이메일의 등장이메일은 1990년대 전 세계가 온라인에 접속했을 때 사람들이 했던 첫 번째 활동 중 하나였습니다. 기술이 거의 허용하지 않았기 때문에 대역폭

infoofit.tistory.com

 

[FCF] Cybersecurity 2.0 - Lesson 06 : Content Filters(콘텐츠 필터)

 

[FCF] Cybersecurity 2.0 - Lesson 06 : Content Filters(콘텐츠 필터)

A. 콘텐츠 필터 개요콘텐츠 필터링은 불쾌한 이메일, 웹페이지, 실행 파일 및 기타 의심스러운 항목에 대한 액세스를 차단하거나 제한하는 프로세스입니다. 이는 종종 인터넷 방화벽에 내장되어

infoofit.tistory.com

 

반응형