NSE 1 - Quiz 3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

4/9/2020 Quiz

 The Threat Landscape

Started on Thursday, April 9, 2020, 1:18 PM


State Finished
Completed on Thursday, April 9, 2020, 1:53 PM
Time taken 34 mins 53 secs
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.

Question 1 How long has the role of CISO been present?


Correct

1.00 points out Select one:


of 1.00
The role of CISO is relatively new. 

The role of CISO has existed for 129 years.

The role of CISO does not exist yet.

The role of CISO is the oldest C-level position.

Question 2 In many of the breaches, tens of millions of credit cards become compromised, and personally identifiable information for millions of
Correct individuals are stolen. What is one result?
1.00 points out
of 1.00 Select one:
Market capitalization increase

Clearance sales

Class-action lawsuits 

Increase in share price

Question 3 In what ways are CISOs often expected to represent the company?
Correct

1.00 points out Select one:


of 1.00
Thought leadership, partnership development, and customer engagement. 

Public relations, advertising, and marketing.

Career day at a local school.

Presenting new products at a trade show booth.

Question 4 Originally, the role of CISO was mostly concerned with which topic?
Correct

1.00 points out Select one:


of 1.00
Budgeting

Compliance 

Operations

Finance

https://training.fortinet.com/mod/quiz/review.php?attempt=2808336&cmid=3850 1/2
4/9/2020 Quiz

Question 5 What can be said for a company’s data that resides outside their buildings?
Correct

1.00 points out Select one:


of 1.00
It is impossible to secure or protect.

It is impossible to even find.

It must be secured and protected just the same. 

It is already secured and protected by the very nature of the cloud.

Question 6 What do the other C-level executives want from a CISO?


Correct

1.00 points out Select one:


of 1.00
A concrete assessment of database performance.

A concrete assessment of information risk and value. 

A concrete assessment of website costs.

A concrete assessment of vendor performance.

Question 7 What is the result of these breaches becoming the targets of government regulators?
Correct

1.00 points out Select one:


of 1.00
Increased health department inspections

Huge fines 

Lower insurance rates

Unexpected tax audits

Question 8 What is the term for when departments or individuals go outside the corporate policies and spin up their own applications, utilize
Correct unapproved or uncoordinated SaaS services, or otherwise allow what may be key information assets to be stored out of our control?
1.00 points out
of 1.00 Select one:
Ninja IT

Dodgy IT

Shadow IT 

Vapor IT

Question 9 What results from the loss of control of customers’ personally identifiable information?
Correct

1.00 points out Select one:


of 1.00
The loss of customer trust and lasting damage to brand reputation. 

A rise in customer-created crowdfunding initiatives.

An increase in customer sympathy and a strengthening of brand reputation.

The loss of customer trust and a strengthening of brand reputation.

Question 10 Where are the information assets in a typical company today?


Correct

1.00 points out Select one:


of 1.00
Stored in carefully controlled servers.

Inside the main building.

Scattered all over the place. 

Consolidated in a central mainframe.

https://training.fortinet.com/mod/quiz/review.php?attempt=2808336&cmid=3850 2/2

You might also like