Académique Documents
Professionnel Documents
Culture Documents
State Finished
Completed on Thursday, April 11, 2019, 12:32 PM
Time taken 2 hours 35 mins
Points 5/5
Grade 100 out of 100
Feedback Congratulations, you have passed!
Question 1
Correct
1 points out of 1
Flag question
Question text
Question 2
Correct
1 points out of 1
Flag question
Question text
Select one:
Data Leak Prevention (DLP)
Distributed Leak Prevention (DLP)
Data Storage Processing (DSP)
Data Level Protection (DLP)
Question 3
Correct
1 points out of 1
Flag question
Question text
What is phishing?
Select one:
Process of scanning for network vulnerabilities.
Practice of tricking unsuspecting people to reveal sensitive information or to extract
money.
Process of installing a fake firewall instance onto the network.
Practice of changing user credentials.
Question 4
Correct
1 points out of 1
Flag question
Question text
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
Filters that send automated responses to the sender.
Filters that scan the network for malware presence.
Spam filters identify certain words or patterns in the headers or bodies of the messages
in order to validate the email content.
A network component that strengthens the authentication method.