Q. In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)
Select one or more:
- Email emulator
- Firewall
- Antivirus scanner
- Sandbox
Q. Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?
Select one:
- Volume of attacks
- Delay in implementing the sender policy framework
- Success of click-bait
- Data loss
Q. Which option identifies the trend of email spamming and phishing?
Select one:
- Declining
- Increasing
- Erratic
- Plateaued
Q. Which technique used by a threat actor is known as spam?
Select one:
- Weaponized emails that claim to come from a legitimate sender
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
- An attacker observes websites that a targeted group visits, and herds them into an infected website
- Fraudulent messages that target a specific role or person within an organization
Q.Which method did the earliest spam filter use to stop spam?
Select one:
- Detected unusual behaviour
- Tested emails in a sandbox environment
- Identified specific words or patterns
- Detected illegitimate email addresses
Q. Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)
Select one or more:
- An embedded hyperlink within an email
- An attachment to an email
- An infected thumb drive
- Click bait
Q. Which technique used by a threat actor is known as phishing?
Select one:
- A fraudulent practice of sending emails purporting to be reputable in order to steal personal information
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
- Fraudulent messages that target a specific role or person within an organization
- An attacker observes websites that a targeted group visits, and herds them into an infected website
Q. Which method did the earliest spam filter use to stop spam?
Select one:
- Detected unusual behaviour
- Tested emails in a sandbox environment
- Identified specific words or patterns
- Detected illegitimate email addresses
[FCF] Cybersecurity 2.0 - Lesson 05 : Secure Email Gateway(보안 이메일 게이트웨이)
[FCF] Cybersecurity 2.0 - Lesson 06 : Content Filters(콘텐츠 필터)