NSE 2 Lesson 13 – NSE 2 Secure Email Gateway

NSE 2 Lesson 13 – NSE 2 Secure Email Gateway

NSE 2 Lesson 13 – NSE 2 Secure Email Gateway

Question 1

Question text

Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)

Select one or more:

  • An attachment to an email
  • An infected thumb drive
  • An embedded hyperlink within an email
  • Click bait

Question 2

Question text

Which method did the earliest spam filter use to stop spam?

Select one:

  • Detected illegitimate email addresses  
  • Identified specific words or patterns
  • Tested emails in a sandbox environment
  • Detected unusual behaviour

Question 3

Question text

Which technique used by a threat actor is known as spam?

Select one:

  • An attacker observes websites that a targeted group visits, and herds them into an infected website
  • Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
  • Weaponized emails that claim to come from a legitimate sender
  • Fraudulent messages that target a specific role or person within an organization

Question 4

Question text

Which technique used by threat actors is known as phishing?

Select one:

  • An attacker observes websites that a targeted group visits, and herds them into an infected website
  • A fraudulent practice of sending emails purporting to be reputable in order to steal information
  • Fraudulent messages that target a specific role or person within an organization
  • Irrelevant or inappropriate messages sent on the Internet to a large number of recipients

Question 5

Question text

Which option identifies the trend of phishing?

Select one:

  • Declining
  • Increasing
  • Plateaued
  • Erratic

Question 6

Question text

In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)

Select one or more:

  • Antivirus scanner
  • Sandbox
  • Email emulator
  • Firewall

Question 7

Question text

Which method did the earliest spam filter use to stop spam?

Select one:

  • Detected unusual behaviour
  • Identified specific words or patterns
  • Detected illegitimate email addresses
  • Tested emails in a sandbox environment

Question 8

Question text

Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)

Select one or more:

  • An attachment to an email
  • An infected thumb drive
  • Click bait
  • An embedded hyperlink within an email

Question 9

Question text

Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?

Select one:

  • Data loss
  • Volume of attacks
  • Success of click-bait
  • Delay in implementing the sender policy framework

Question 10

Question text

Which option identifies the trend of phishing?

Select one:

  • Plateaued
  • Declining
  • Increasing
  • Erratic