Fortinet NSE-1
Lesson 4—Internet Threat Perspectives
Q. Which three of the following activities represents data vulnerabilities on a mobile device. (Choose three.)
Select one or more:
Listening to music
Banking
Synchronization between computers and mobile devices
Social networking
Creating contacts
Q.Complete the sentence. A social engineering attack that compromises public charging stations and installs malware when a portable device plugs in, is known as
Select one:
Spearphishing
Phishing
Juice Jacking
Ransomware
Q Which of the following is a good habit for protecting your mobile device?
Select one:
Change the factory-set default password and username.
Set up a personal hotspot.
Test connectivity by doing online banking.
Configure your email accounts.
Q. Complete the sentence. Phishing attacks are different than spearphishing, whaling, and vishing because they
Select one:
use social media and social engineering techniques to lure their victims, while the others primary use email.
involve hackers hanging out at internet forums who then collect information about individuals to target, while the others are aimed at a wide audience.
are aimed at a wide audience, while the others are directed toward individuals or specific organizations.
are directed against smaller players—small fish you might say, while the others use social media sites.
Q.Which precaution should you take if you receive an email that involves the movement of money, such as the payment of an invoice, even if it is from someone you know?
Select one:
Use another form of trusted communication to verify that the message is legitimate.
Look for spelling mistakes in the email. If you find any, delete the email. It’s obviously a scam.
Pay it immediately to avoid late fees.
Reply to the email and ask them to provide proof of their identity
No comments:
Post a Comment