COMPLETE QUESTIONS WITH CORRECT DETAILED
ANSWERS || 100% GUARANTEED PASS
<LATEST VERSION>
1. Reconnaissance emails (recon emails) - ANSWER ✔ used to check if the
destination mailbox is in use so that it can be targeted in future phishing
attack
2. can be spam, social engineering or tracking pixels
3. Credential Harvesters - ANSWER ✔ most common phishing emails
4. targeting human weaknesses to attempt to retrieve valid credentials
5. email will tell the recipient to click a button or URL, where they will
typically be presented with a real-looking login portal
6. Social Engineering - ANSWER ✔ the practice of exploiting a human as
opposed to a system
7. malicious actors can convince employees that they are someone they know,
or even someone in a higher position that has more power than them
,8. Smishing - ANSWER ✔ kind of phishing attack, where the attack vector is
through a text message or SMS
9. best way to defend is user security awareness training and education
10.Vishing - ANSWER ✔ kind of phishing attack, where the attack vector is
through a phone call
11.best way to defend is user security awareness training and education
12.Whaling - ANSWER ✔ highly-targeted phishing attack that looks to target
individuals within management positions in an organization
13.best way to defend is implementing DLP, marking external emails, train
individuals to detect phishing emails
14.Malicious Attachments - ANSWER ✔ malicious actors will send you
Microsoft Office documents to bypass email scanners and to seem less
suspicious
15.include malicious macros, series of command and instructions, that
download malware to the system
16.Hosted Malware - ANSWER ✔ method of hosting malware on websites and
convincing users to click on a hyperlink, download a file, and then run it
, 17.actor can create a malicious domain or compromise a legitimate site then
host the malware
18.Spam Emails - ANSWER ✔ messages that are unsolicited, unwanted, or
unexpected but are not necessarily malicious in nature
19.should not be confused with malicious spam emails
20.False Positives - ANSWER ✔ messages that have not been sent by a
malicious actor and are instead legitimate emails that have been incorrectly
reported as malicious
21.Data Loss Prevention Engineer - ANSWER ✔ Supports an organization's
cybersecurity roadmap by ensuring that data is secured through testing,
implementation, design, and monitoring. They liaise with business
stakeholders as the data security expert, enabling compliance with the
relevant cybersecurity laws and frameworks.
22.Identity and Access Management (IAM) Engineer - ANSWER ✔ Implement
and continuously optimize Identity and Access Management services in line
with evolving technologies and security regulations. They are responsible
for designing, implementing, and maintaining IAM technologies to ensure
audit and privacy compliance, driving automation wherever possible. They
also assist with resolving any security issues related to IAM operations.