The Threat Landscape: Correct 1.00 Points Out of 1.00

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

6/5/2020 Quiz

 The Threat Landscape

Started on Wednesday, May 6, 2020, 9:19 AM


State Finished
Completed on Wednesday, May 6, 2020, 9:27 AM
Time taken 8 mins 5 secs
Points 9.00/10.00
Grade 90.00 out of 100.00
Feedback Congratulations, you passed.

Question 1 If a vendor or website offers two-factor authentication, what is the recommended action?
Correct

1.00 points out Select one:


of 1.00
Wait for everyone else to do it.

Enable and use two-factor authentication. 

Politely decline.

Immediately reboot your computer.

Question 2 To prevent spammers from learning that you’ve seen one of their emails, what should you do?
Correct

1.00 points out Select one:


of 1.00
Immediately reboot your computer.

Delete the email message.

Reply to the sender of the email message.

Set your email client to not automatically download the images in email messages. 

Question 3 Where can you download the highly-rated and free FortiClient security product from?
Correct

1.00 points out Select one:


of 1.00
freeforticlient.com

forticlient.com 

Your favorite malware marketplace.

forticlientfree.com

Question 4 How often should you change your passwords?


Correct

1.00 points out Select one:


of 1.00
Once in a blue moon.

Never

Each time there is a total solar eclipse.

On a regular basis. 

https://training.fortinet.com/mod/quiz/review.php?attempt=3563030&cmid=3852 1/2
6/5/2020 Quiz

Question 5 What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to
Correct disclose sensitive information or click on a link?
1.00 points out
of 1.00 Select one:
Phishing 

Trojan

Malware

Virus

Question 6 What tool can you use to help “remember” all your passwords?
Correct

1.00 points out Select one:


of 1.00
A password manager. 

A rubber band.

Vitamin E

Yellow sticky notes.

Question 7 When you receive an unsolicited email, what should you do if it has an attachment?
Correct

1.00 points out Select one:


of 1.00
Don’t open the attachment. 

Forward the email to all your friends.

Immediately reboot your computer.

Open the attachment to learn how to make money online.

Question 8 Why is it risky to keep using an operating system that is no longer supported or updated?
Correct

1.00 points out Select one:


of 1.00
Many cyber attacks exploit unpatched vulnerabilities in old, unsupported operating systems. 

The hard drive may fail.

The computer may reboot.

The latest social media tools may not work on the old operating system.

Question 9 What should you do if you get an unsolicited email from an otherwise trusted source that says to click a link?
Incorrect

0.00 points out Select one:


of 1.00
Launch a browser or app manually, then log into their website to investigate the issue.

Reply to the email message.

Click on the link to learn how to make money online.

Immediately reboot your computer. 

Question 10 What action can be taken in advance to help protect your data from corruption from malware?
Correct

1.00 points out Select one:


of 1.00
Disable all anti-virus software.

Reboot your computer.

Set up regular backups. 

Buy a substantial amount of Bitcoin currency.

https://training.fortinet.com/mod/quiz/review.php?attempt=3563030&cmid=3852 2/2

You might also like