Contents
- 1 NSE 1 Information Security Awareness Fortinet – Data Security Perspectives Quiz Answers
- 2 2. In the context of cybersecurity, which definition best describes social engineering?
- 3 3. Identify the best description of vishing.
- 4 4. Which description best identifies the term malicious code?
- 5 5. Which description best explains cybersecurity?
- 6 6. Identify three examples of personally identifiable information (PII). (Choose three.)
- 7 Delving into Data Security: Protect Yourself from Bad Actors
NSE 1 Information Security Awareness Fortinet – Data Security Perspectives Quiz Answers
The quiz answers for the Data Security Perspectives are available for the NSE 1 Information Security Awareness Fortinet Certification. The certification includes five lessons, and the answers for the lesson 2. are included in this post. The application link is also provided below.
1. Which definition best describes personally identifiable information (PII)?
- Personal preferences, such as favourite settings in applications
- A means of identifying the author of information
- Any information that someone can use to identify you
- A government-issued number that is used to identify a citizen, mostly for tax purposes
- An exploitation of a relationship or interaction to trick a person into divulging sensitive or personal information
- A movement by which engineers are coerced into writing code a specific way
- A group of engineers who come together to talk code
- A cooperative method used to develop and improve code
3. Identify the best description of vishing.
- A fraudulent text-based message that attempts to trick someone into divulging information
- A fraudulent email that pretends to be from a reputable source that targets a group of people for purposes of disclosing information
- The process of introducing malware by some security loophole in an application
- A phone exploitation that often relies on caller ID to appear legitimate
4. Which description best identifies the term malicious code?
- A program that has flaws in it
- Untested code that a vendor releases to the public
- Code that does not behave in the manner intended by its author
- An unwanted file or program that can cause harm to, or compromise data on, a computer
5. Which description best explains cybersecurity?
- Protecting networks, devices, and data from unauthorized access
- Securing cyber advantages over a business competitor
- Strategic Defence Initiative (SDI)
- Home and business security, using motion sensors and monitored by a security vendor
6. Identify three examples of personally identifiable information (PII). (Choose three.)
- Biometrics, such as a fingerprint
- Credit card
- A one-time passcode sent to your device
- Full name
- Your network login credentials
Delving into Data Security: Protect Yourself from Bad Actors
In the age of digital vulnerability, understanding threats and securing your data is paramount. This lesson delves into the dark side of cyberspace, revealing the tactics of malicious actors and empowering you with strategies to safeguard your valuable information.
Prepare to:
- Unravel the jargon: We’ll unravel key cybersecurity terms, ensuring you navigate this crucial domain with confidence.
- Identify the enemy’s weapons: Demystify common attack vectors, recognizing how bad actors infiltrate systems and exploit vulnerabilities.
- Unmask the root cause: Discover the primary culprit behind computer and network breaches, equipping you to stay ahead of the curve.
By mastering these fundamentals, you’ll gain the knowledge and power to fortify your digital defenses and minimize the risk of falling victim to malicious machinations.










