NSE 2 Lesson 13 – NSE 2 Secure Email Gateway
NSE 2 Lesson 13 – NSE 2 Secure Email Gateway
Question 1
Question text
Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)
Select one or more:
- An attachment to an email
- An infected thumb drive
- An embedded hyperlink within an email
- Click bait
Question 2
Question text
Which method did the earliest spam filter use to stop spam?
Select one:
- Detected illegitimate email addresses
- Identified specific words or patterns
- Tested emails in a sandbox environment
- Detected unusual behaviour
Question 3
Question text
Which technique used by a threat actor is known as spam?
Select one:
- An attacker observes websites that a targeted group visits, and herds them into an infected website
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
- Weaponized emails that claim to come from a legitimate sender
- Fraudulent messages that target a specific role or person within an organization
Question 4
Question text
Which technique used by threat actors is known as phishing?
Select one:
- An attacker observes websites that a targeted group visits, and herds them into an infected website
- A fraudulent practice of sending emails purporting to be reputable in order to steal information
- Fraudulent messages that target a specific role or person within an organization
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients
Question 5
Question text
Which option identifies the trend of phishing?
Select one:
- Declining
- Increasing
- Plateaued
- Erratic
Question 6
Question text
In addition to a spam filter, which two technologies are often a part of secure email gateway (SEG)? (Choose two.)
Select one or more:
- Antivirus scanner
- Sandbox
- Email emulator
- Firewall
Question 7
Question text
Which method did the earliest spam filter use to stop spam?
Select one:
- Detected unusual behaviour
- Identified specific words or patterns
- Detected illegitimate email addresses
- Tested emails in a sandbox environment
Question 8
Question text
Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)
Select one or more:
- An attachment to an email
- An infected thumb drive
- Click bait
- An embedded hyperlink within an email
Question 9
Question text
Which challenge caused secure email gateway (SEG) to adopt automation and machine learning?
Select one:
- Data loss
- Volume of attacks
- Success of click-bait
- Delay in implementing the sender policy framework
Question 10
Question text
Which option identifies the trend of phishing?
Select one:
- Plateaued
- Declining
- Increasing
- Erratic