4 September 2020

Fortinet NSE 1 Certifications Answer - Data Security Quiz


Question 1: Which definition best describes personally identifiable information (PII)?

 

·         Personal preferences, such as favourite setting in applications

·         Any information that someone can use to identify you

·         A means of identifying that author of information

·         A government-issued number that is used to identify a citizen, mostly for tax purposes

 

 

Question 2: In the context of cybersecurity, which definition best describes social engineering?

 

·         An exploitation of a relationship of interaction to trick a person into divulging sensitive or personal information

·         A movement by which engineers are coerced into writing code a specific way

·         A group of engineers who come together to talk code

·         A cooperative method used to develop and improve code

 

Question 3: Identify the best description of vishing

 

·         A phone exploitation that often relies on caller ID to appear legitimate

·         A fraudulent text-based message that attempts to trick someone into divulging information

·         A fraudulent email that pretends to be from a reputable source that targets a group of people for purposes of disclosing information

·         The process of introducing malware by some security loophole in an application

 

Question 4: Which description best identifies the term malicious code?

 

·         A program that has flaws in it

·         Code that does not behave in the manner intended by its author

·         An unwanted file or program that can cause harm to, or compromise data on, a computer

·         Untested code that a vendor releases to the public

 

Question 5: Which description best explains cybersecurity?

 

·         Protecting networks, devices, and data from unauthorized access

·         Securing cyber advantages over a business competitor

·         Strategic Defence Initiative (SDI)

·         Home and business security, using motion sensors and monitored by a security vendor

 

Question 6: Identify three examples of personally identifiable information (PII).

 

·         Biometrics, such as a fingerprint

·         Credit Card

·         Full name

·         A one-time passcode sent to your device

·         Your network login credentials

2 September 2020

Fortinet NSE 1 Certification Answers - Bad Actors Quiz


Question 1: What is the motivation of the bad actor known as the “Explorer”?

 

·         Notoriety

·         Money

·         Ideology

·         Food

 

Question 2: What is the motive of the “Cyber Criminal”?

 

·         Fame

·         Money

·         Ideology

·         Intimidation

 

Question 3: What are the primary motivations of the “Hacktivist”?


·         Food, wine, and gambling

·         The appreciation of their country’s leaders

·         Political, social, or moral disagreements

·         The cost of commercial software and support

 

Question 4: Attacking systems by exploiting unknown and unpatched vulnerabilities is also known as:


·         Phishing

·         Secret Sauce

·         First day exploits

·         Zero day exploits

 

Question 5: What is the goal of the “Cyber Terrorist”?


·         Stable world markets

·         Peace through understanding

·         Intimidation through disruption and damage

·         Adoption of bitcoin as a primary national currency

 

Question 6: What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?


·         Trolling

·         Harpooning

·         Phishing

·         Baselining

 

Question 7: What central component is necessary to form a botnet?

 

·         DNS Server

·         Ethernet Switch

·         Command & Control (C&C) Server

·         Transformer

 

Question 8: What is the motivation of the “Cyber Terrorist”?

 

·         Compassion

·         Ideology

·         Fortune

·         Fame

 

Question 9: What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?

 

·         Phishingware

·         Ransomware

·         Scareware

·         Kindnapware