Fortinet NSE-1 


Lession-5 Insider Threat Perspectives


Q. Which practice strengthens the physical security of your work environment?

Select one:

Pile all confidential documents neatly to one corner of your desk.

Shred and destroy all documents that contain sensitive personal or organizational information rather than tossing them into the waste bin.

Ensure that your software is up-to-date and that the latest patches are applied.

Recycle all paper, CDs, DVDs, hard drives etc. into their appropriate bins.



Q. Which method is a defense against potential insider threats?

Select one:

Monitor your co-workers’ daily activities.

Identify and report any suspicious activity.

Investigate and if possible resolve the threat on your own.

Confront any person you suspect of being an insider threat.



Q.Identify two best practices for physical security awareness. (Choose two.)

Select one or more:

Follow your organization’s security policies unless they hinder efficiency.

Keep your desk free of any proprietary or confidential information.

Lock your computer screen and mobile devices every time you step away.

Always be considerate, such as holding the door open for people, even if you don’t know them.




Q. Who are included as insider threats?

Select one:

Another organization or person who see themselves as competitors

Ambitious people

Employees who sometimes do not follow security practices

Any person with network security skills who works outside an organization



Q. If a suspicious package appears at your desk, which action is best aligned with good physical security practices?

Select one:

Get your neighbour to open the package.

Carefully open the package and report what you find.

Report the package and do not open or touch it.

Destroy the package using an industrial shredder.


 Fortinet NSE-1


Lesson 4—Internet Threat Perspectives


Q. Which three of the following activities represents data vulnerabilities on a mobile device. (Choose three.)

Select one or more:

Listening to music

 Banking

 Synchronization between computers and mobile devices

 Social networking

Creating contacts



Q.Complete the sentence. A social engineering attack that compromises public charging stations and installs malware when a portable device plugs in, is known as

Select one:

Spearphishing

Phishing 

Juice Jacking

Ransomware


Q Which of the following is a good habit for protecting your mobile device?

Select one:

Change the factory-set default password and username.

Set up a personal hotspot.

Test connectivity by doing online banking.

Configure your email accounts.


Q. Complete the sentence. Phishing attacks are different than spearphishing, whaling, and vishing because they

Select one:

use social media and social engineering techniques to lure their victims, while the others primary use email.

involve hackers hanging out at internet forums who then collect information about individuals to target, while the others are aimed at a wide audience.

are aimed at a wide audience, while the others are directed toward individuals or specific organizations.

are directed against smaller players—small fish you might say, while the others use social media sites.



Q.Which precaution should you take if you receive an email that involves the movement of money, such as the payment of an invoice, even if it is from someone you know?

Select one:

Use another form of trusted communication to verify that the message is legitimate.

Look for spelling mistakes in the email. If you find any, delete the email. It’s obviously a scam.

Pay it immediately to avoid late fees.

Reply to the email and ask them to provide proof of their identity


 

Fortinet NSE 1

Lession-1 


 Q. What component is necessary to form a botnet?

A. Command & Control Server (C&C)


Q. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?

A. Phishing


Q. What is the goal of the Cyber Terrorist?

A. Intimidation through disruption and damage


Q. What is the motivation of the bad actor known as the "Explorer"?

A Notoriety


Q. What is the motivation of the "Cyber Terrorist"?

A. Ideology


Q. What is the motive of the "Cyber Criminal"?

A Money


Q. What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?

A. Ransomware


Q. What is the primary motive of the "Cyber Warrior"?

A. The political interest of their country's government


Q. Zero-day exploits

A. Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities


Q. Primary motivations of the Hacktivist

A. Political, social, or moral disagreements