Internet Threat Perspectives Quiz Answers

Hello Friends in this article i am gone to share Fortinet: NSE 1 Information Security Awareness | Lesson 4 – Internet Threat Perspectives Quiz Answers with you..

Course link: NSE 1 Information Security Awareness

Lesson 4 – In the Internet Threat Perspectives lesson, you learn about how new technologies have expanded the attack surface, the myriad of social engineering techniques employed by the bad actors, and best practices for keeping yourself safe while navigating the internet.


Internet Threat Perspectives Quiz Answers

Question 1)
Select two good travelling habits for protecting your portable device. (Choose two.)

  • Encrypt all sensitive data
  • Avoid joining unknown Wi-Fi networks
  • Join only Wi-Fi networks from recognizable brands, such as Starbucks
  • Turn off automatic security software updates

Question 2)
You receive an email from your bank. It states that someone has your password and that you must take immediate action by clicking the link provided. What should you do?

  • Click the link and change your password. Time is of the essence.
  • Delete and report it to the bank by using the contact information found on their website.
  • Reply to the email to confirm that they have the correct account by providing your bank account number.
  • Scour the email for spelling mistakes. If there are none, then the email is legitimate and you can click the link.

Question 3)
Which precaution should you take if you receive an email that involves the movement of money, such as the payment of an invoice, even if it is from someone you know?

  • Pay it immediately to avoid late fees.
  • Reply to the email and ask them to provide proof of their identity.
  • Use another form of trusted communication to verify that the message is legitimate.
  • Look for spelling mistakes in the email. If you find any, delete the email. It’s obviously a scam.

Question 4)
Which three of the following activities represents data vulnerabilities on a mobile device. (Choose three.)

  • Banking
  • Social networking
  • Synchronization between computers and mobile devices
  • Creating contacts
  • Listening to music

Question 5)
Which of the following is a good habit for protecting your mobile device?

  • Configure your email accounts.
  • Set up a personal hotspot.
  • Change the factory-set default password and username.
  • Test connectivity by doing online banking.

Question 6)
Which is the number one infection vector for all kinds of malware?

  • Email
  • Web pages
  • Text messages
  • Juice jacking

Question 7)
Complete the sentence. A social engineering attack that compromises public charging stations and installs malware when a portable device plugs in, is known as

  • Spear phishing
  • Phishing
  • Ransomware
  • Juice Jacking

Question 8)
Complete the sentence. Phishing attacks are different than spear phishing, whaling, and vishing because they.

  • are directed against smaller players—small fish you might say, while the others use social media sites.
  • are aimed at a wide audience, while the others are directed toward individuals or specific organizations.
  • use social media and social engineering techniques to lure their victims, while the others primary use email.
  • involve hackers hanging out at internet forums who then collect information about individuals to target, while the others are aimed at a wide audience.

Question 9)
Which three activities pose a potential security threat to users? (Choose three.)

  • Using your own portable charger in a public place
  • Connecting as a guest on an organization’s Wi-Fi network
  • Reading an online journal from a public library computer
  • Doing your banking on your laptop from a friend’s secured home network
  • Connecting your device to a public, wireless hotspot to pay for a rental car

 

Leave a Comment