Fortinet NSE1

Fortinet NSE1 Security Quiz
Test your knowledge on cybersecurity and physical security practices with our Fortinet NSE1 Security Quiz! This quiz includes 38 thought-provoking questions that cover insider threats, password management, mobile device safety, and more.
- Engaging questions
- Learn about best practices
- Comprehensive review of security measures
Which practice strengthens the physical security of your work environment?
Shred and destroy all documents that contain sensitive personal or organizational information rather than tossing them into the waste bin.
Ensure that your software is up-to-date and that the latest patches are applied.
Recycle all paper, CDs, DVDs, hard drives etc. Into their appropriate bins.
Pile all confidential documents neatly to one corner of your desk.
Why are insider threats one of the most challenging attack vectors?
There is little that can be done to prevent a denial of service attack.
Employees are trusted users who have legitimate access to an organization’s data and resources
Insider attacks are common, obvious, and overwhelm IT security.
Network security is designed to defend against outsiders, not insiders.
If a suspicious package appears at your desk, which action is best aligned with good physical security practices?
Get your neighbour to open the package
Report the package and do not open or touch it.
Carefully open the package and report what you find.
Destroy the package using an industrial shredder.
What is the root cause of almost every data breach?
Zero-day attack
Human Error
Poorly crafted password
Unpatched device
Who are included as insider threats?
Ambitious people
Another organization or person who see themselves as competitors
Any person with network security skills who works outside an organization
Employees who sometimes do not follow security practices
Which method is a defense against potential insider threats?
Confront any person you suspect of being an insider threat.
Monitor your co-workers’ daily activities.
Investigate and if possible resolve the threat on your own.
Identify and report any suspicious activity.
Which practice should you implement for backups?
Encrypt the backup data for an extra layer of protection.
Keep a backup device physically connected to the host computer 100% of the time.
Use multiple backup vendors for redundancy.
Always back up your data in the cloud.
Which rule is best to follow for securing passwords?
Use a combination of seemingly random upper and lowercase letters, numbers, and special characters that is easy to remember but difficult to guess.
Never leave your password on a sticky note stuck to your monitor. Instead, hide it under your keyboard.
Use something that you would never forget, like the name of your family pet.
Use a predictable pattern of numbers or letters.
Identify two best practices for physical security awareness. (Choose two.)
Always be considerate, such as holding the door open for people, even if you don’t know them.
Follow your organization’s security policies unless they hinder efficiency.
Lock your computer screen and mobile devices every time you step away.
Keep your desk free of any proprietary or confidential information.
Which two characteristics are examples of poor passwords? (Choose two.)
A predictable sequence of numbers or words
A commonly used word or unchanged default password
A memorable passphrase written as a random sequence of keyboard keys
A combination of random letters, numbers, and special characters meaningful only to you
Identify an example of a password that best follows the password guidelines in this lesson
1234567890
J&JwutH2f@P0W
PasswordAndAllThat
Qwerty123
Identify two good password practices. (Choose two.)
Replace the password at least twice a year.
The password should be difficult to remember.
The password should be easy to guess.
The password should be unique from your other passwords.
Which three methods are examples of online multi-factor authentication? (Choose three.)
Software Token
Hardware Token
Password
Full name
Passport or other valid IDs
Which method is recommended to manage passwords?
Write passwords into a Word document.
Memorize one strong password and reuse it to secure all internet services and devices.
Repeat your passwords every night to help you remember them.
Use a password manager.
Select two good travelling habits for protecting your portable device. (Choose two)
Avoid joining unknown Wi-Fi networks
Join only Wi-Fi networks from recognizable brands, such as Starbucks
Turn off automatic security software updates
Encrypt all sensitive data
You receive an email from your bank. It states that someone has your password and that you must take immediate action by clicking the link provided. What should you do?
Click the link and change your password. Time is of the essence.
Scour the email for spelling mistakes. If there are none, then the email is legitimate and you can click the link.
Delete and report it to the bank by using the contact information found on their website.
Reply to the email to confirm that they have the correct account by providing your bank account number.
Which precaution should you take if you receive an email that involves the movement of money, such as the payment of an invoice, even if it is from someone you know?
Pay it immediately to avoid late fees
Look for spelling mistakes in the email. If you find any, delete the email. It’s obviously a scam.
Reply to the email and ask them to provide proof of their identity
Use another form of trusted communication to verify that the message is legitimate.
Which three of the following activities represents data vulnerabilities on a mobile device. (Choose three.)
Synchronization between computers and mobile devices
Creating contacts.
Listening to music.
Banking
Social networking
Which of the following is a good habit for protecting your mobile device?
Change the factory-set default password and username.
Test connectivity by doing online banking.
Configure your email accounts.
Set up a personal hotspot.
Which is the number one infection vector for all kinds of malware?
Text messaging
Juice jacking
Web pages
Email
Complete the sentence. A social engineering attack that compromises public charging stations and installs malware when a portable device plugs in, is known as
Phishing
Spearphishing
Ransomware
Juice jacking
Complete the sentence. Phishing attacks are different than spearphishing, whaling, and vishing because they
Involve hackers hanging out at internet forums who then collect information about individuals to target, while the others are aimed at a wide audience.
Are directed against smaller players—small fish you might say, while the others use social media sites
Are aimed at a wide audience, while the others are directed toward individuals or specific organizations
Use social media and social engineering techniques to lure their victims, while the others primary use email.
Which three activities pose a potential security threat to users? (Choose three.)
Reading an online journal from a public library computer
Using your own portable charger in a public place
Doing your banking on your laptop from a friend’s secured home network
Connecting as a guest on an organization’s Wi-Fi network
Connecting your device to a public, wireless hotspot to pay for a rental car
Which definition best describes personally identifiable information (PII)?
Personal preferences, such as favourite settings in applications
A means of identifying the author of information
Any information that someone can use to identify you
A government-issued number that is used to identify a citizen, mostly for tax purposes
In the context of cybersecurity, which definition best describes social engineering?
An exploitation of a relationship or interaction to trick a person into divulging sensitive or personal information
A movement by which engineers are coerced into writing code a specific way
A group of engineers who come together to talk code
A cooperative method used to develop and improve code
Identify the best description of vishing.
A fraudulent text-based message that attempts to trick someone into divulging information
A fraudulent email that pretends to be from a reputable source that targets a group of people for purposes of disclosing information
The process of introducing malware by some security loophole in an application
A phone exploitation that often relies on caller ID to appear legitimate
Which description best identifies the term malicious code?
A program that has flaws in it
Untested code that a vendor releases to the public
Code that does not behave in the manner intended by its author
An unwanted file or program that can cause harm to, or compromise data on, a computer
Which description best explains cybersecurity?
Protecting networks, devices, and data from unauthorized access
Securing cyber advantages over a business competitor
Strategic Defence Initiative (SDI)
Home and business security, using motion sensors and monitored by a security vendor
Identify three examples of personally identifiable information (PII). (Choose three.)
Biometrics, such as a fingerprint
Credit card
A one-time passcode sent to your device
Full name
Network login credentials
What is the motivation of the bad actor known as the “Explorer”?
Food
Money
Ideology
Notoriety
What is the motive of the “Cyber Criminal”?
Money
Fame
Intimidation
Ideology
What are the primary motivations of the “Hacktivist”?
The appreciation of their country’s leaders
Food, wine, and gambling
Political, social, or moral disagreements
The cost of commercial software and support
Attacking systems by exploiting unknown and unpatched vulnerabilities is also known as
First day exploit
Phishing
Secret sauce
Zero-day exploits
What is the goal of the “Cyber Terrorist”?
Stable world markets
Intimidation through disruption and damage
Peace through understanding
Adoption of Bitcoin as a primary national currency
What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
Trolling
Harponing
Phishing
Baselining
What central component is necessary to form a botnet?
DNS Server
Ethernet Switch
Command and Control (C & C) Server
Transformer
What is the motivation of the “Cyber Terrorist”?
Compassion
Ideology
Fortune
Fame
What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Ransomware
Phishingware
Scareware
Kinapware
{"name":"Fortinet NSE1", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on cybersecurity and physical security practices with our Fortinet NSE1 Security Quiz! This quiz includes 38 thought-provoking questions that cover insider threats, password management, mobile device safety, and more.Engaging questionsLearn about best practicesComprehensive review of security measures","img":"https:/images/course8.png"}
More Quizzes
Security Malware
105135
Cybersecurity Awareness Platform From Mitiget
211030
Get to Know Me Quiz
15813
What's your Perfect Valentine's Day Date?
420
Which Detroit Become Human Character Are You? Find Out Now!
201026767
Free Multiplication Facts - Practice Test
201029704
Personal & Professional Development - Can You Ace It?
201060308
Free Employee Leave Management Knowledge Test
201030747
Free Endpoint Security Product Knowledge
201022585
Should You Join a Gym? Take Our Gym Now
201025317
Silver the Hedgehog & Shadow the Hedgehog: Who Are You?
201025094
Free Practice Test: Personal Finance Chapter 4
201026017