0% found this document useful (0 votes)
2K views2 pages

Secure Email Gateway - Quiz Attempt Review

The document is a summary of a quiz taken on a secure email gateway course. The quiz contained 5 multiple choice questions about technologies that are part of a secure email gateway, the definition of phishing, trends in phishing, and methods used by threat actors in phishing campaigns. The participant scored 4 out of 5 questions correctly, passing the quiz with a grade of 80%.

Uploaded by

king jumper343
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views2 pages

Secure Email Gateway - Quiz Attempt Review

The document is a summary of a quiz taken on a secure email gateway course. The quiz contained 5 multiple choice questions about technologies that are part of a secure email gateway, the definition of phishing, trends in phishing, and methods used by threat actors in phishing campaigns. The participant scored 4 out of 5 questions correctly, passing the quiz with a grade of 80%.

Uploaded by

king jumper343
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Secure Email Gateway - Quiz: Attempt review https://training.fortinet.com/mod/quiz/review.php?attempt=8243113&cm...

 NSE 2 Secure Email Gateway

Started on Friday, September 24, 2021, 10:07 PM


State Finished
Completed on Friday, September 24, 2021, 10:16 PM
Time taken 9 mins 20 secs
Points 4/5
Grade 80 out of 100
Feedback Congratulations, you passed!

Question 1
Correct

1 points out of 1

In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)

Select one or more:


Firewall

Sandbox 

Antivirus scanner 

Email emulator

Question 2
Correct

1 points out of 1

Which technique used by threat actors is known as phishing?

Select one:
Fraudulent messages that target a specific role or person within an organization

A fraudulent practice of sending emails purporting to be reputable in order to steal information 

Irrelevant or inappropriate messages sent on the Internet to a large number of recipients

An attacker observes websites that a targeted group visits, and herds them into an infected website

Question 3
Correct

1 points out of 1

Which option identifies the trend of phishing?

Select one:
Erratic

Increasing 

1 sur 2 24/09/2021, 22:13


Secure Email Gateway - Quiz: Attempt review https://training.fortinet.com/mod/quiz/review.php?attempt=8243113&cm...

Increasing

Declining

Plateaued

Question 4
Incorrect

0 points out of 1

Which method did the earliest spam filter use to stop spam?

Select one:
Detected illegitimate email addresses

Tested emails in a sandbox environment 

Detected unusual behaviour

Identified specific words or patterns

Question 5
Correct

1 points out of 1

Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)

Select one or more:


An attachment to an email 

An infected thumb drive

An embedded hyperlink within an email 

Click bait

2 sur 2 24/09/2021, 22:13

You might also like