NSE 1 Information Security Awareness Fortinet – Internet Threat Perspectives Quiz Answers

()

NSE 1 Information Security Awareness Fortinet – Internet Threat Perspectives Quiz Answers

The quiz answers for the Internet Threat Perspectives are available for the NSE 1 Information Security Awareness Fortinet Certification. The certification includes five lessons, and the answers for the lesson 4 are included in this post. The application link is also provided below.

1. Select two good travelling habits for protecting your portable device. (Choose two.)

  • Avoid joining unknown Wi-Fi networks
  • Join only Wi-Fi networks from recognizable brands, such as Starbucks
  • Turn off automatic security software updates
  • Encrypt all sensitive data

2. You receive an email from your bank. It states that someone has your password and that you must take immediate action by clicking the link provided. What should you do?

  • Click the link and change your password. Time is of the essence.
  • Scour the email for spelling mistakes. If there are none, then the email is legitimate and you can click the link.
  • Delete and report it to the bank by using the contact information found on their website.
  • Reply to the email to confirm that they have the correct account by providing your bank account number.

3. Which precaution should you take if you receive an email that involves the movement of money, such as the payment of an invoice, even if it is from someone you know?

  • Pay it immediately to avoid late fees.
  • Look for spelling mistakes in the email. If you find any, delete the email. It’s obviously a scam.
  • Reply to the email and ask them to provide proof of their identity.
  • Use another form of trusted communication to verify that the message is legitimate.

4. Which three of the following activities represents data vulnerabilities on a mobile device. (Choose three.)

  • Synchronization between computers and mobile devices
  • Creating contacts
  • Listening to music
  • Banking
  • Social networking

5. Which of the following is a good habit for protecting your mobile device?

  • Change the factory-set default password and username.
  • Test connectivity by doing online banking.
  • Configure your email accounts.
  • Set up a personal hotspot.

6. Which is the number one infection vector for all kinds of malware?

  • Text messages
  • Juice jacking
  • Web pages
  • Email

7. Complete the sentence. A social engineering attack that compromises public charging stations and installs malware when a portable device plugs in, is known as

  • Phishing
  • Spearphishing
  • Ransomware
  • Juice Jacking

8. Complete the sentence. Phishing attacks are different than spearphishing, whaling, and vishing because they

  • involve hackers hanging out at internet forums who then collect information about individuals to target, while the others are aimed at a wide audience.
  • are directed against smaller players—small fish you might say, while the others use social media sites.
  • are aimed at a wide audience, while the others are directed toward individuals or specific organizations.
  • use social media and social engineering techniques to lure their victims, while the others primary use email.

9. Which three activities pose a potential security threat to users? (Choose three.)

  • Reading an online journal from a public library computer
  • Using your own portable charger in a public place
  • Doing your banking on your laptop from a friend’s secured home network
  • Connecting as a guest on an organization’s Wi-Fi network
  • Connecting your device to a public, wireless hotspot to pay for a rental car

How to Protect Yourself from Internet Threats

The internet is a powerful tool that can be used for good or evil. On the one hand, it can connect us with friends and family, provide access to information, and facilitate commerce. On the other hand, it can also be used to spread misinformation, commit fraud, and steal personal information.

It’s important to be aware of the internet’s dangers and take steps to protect yourself. Here are some tips:

  • Use strong passwords and two-factor authentication. A strong password is at least 12 characters long and includes a mix of uppercase and lowercase letters, numbers, and symbols. Two-factor authentication adds an extra layer of security by requiring you to enter a code from your phone in addition to your password.
  • Be careful what you click on. Don’t click on links in emails or on websites unless you’re sure they’re legitimate.
  • Keep your software up to date. Software updates often include security patches that can help protect your system from vulnerabilities.
  • Be wary of social engineering attacks. Social engineering attacks are designed to trick you into revealing personal information or clicking on a malicious link. Common social engineering attacks include phishing, pretexting, and baiting.
  • Use a firewall and antivirus software. A firewall can help protect your computer from unauthorized access, and antivirus software can help protect you from malware.

By following these tips, you can help protect yourself from internet threats and keep your personal information safe.

Article Rating

Click on a star to rate it!

Average rating / 5. Vote count:

No votes so far! Be the first to rate this post.

Leave a Comment