Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
84 views2 pages

The Threat Landscape: Correct 1.00 Points Out of 1.00

The document is a quiz on cybersecurity topics taken on May 6, 2020 that the participant received full marks on. It consisted of 10 multiple choice questions covering issues such as the relatively new role of the CISO, results of data breaches like class action lawsuits and government fines, the original focus of the CISO role on compliance, the need to secure data outside company buildings and in the cloud, expectations of CISOs to assess information risk and value, the term "shadow IT" to describe unauthorized systems, the damage to brand reputation from loss of customer data, and information assets today being scattered in various locations.

Uploaded by

Van le Dang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views2 pages

The Threat Landscape: Correct 1.00 Points Out of 1.00

The document is a quiz on cybersecurity topics taken on May 6, 2020 that the participant received full marks on. It consisted of 10 multiple choice questions covering issues such as the relatively new role of the CISO, results of data breaches like class action lawsuits and government fines, the original focus of the CISO role on compliance, the need to secure data outside company buildings and in the cloud, expectations of CISOs to assess information risk and value, the term "shadow IT" to describe unauthorized systems, the damage to brand reputation from loss of customer data, and information assets today being scattered in various locations.

Uploaded by

Van le Dang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

6/5/2020 Quiz

 The Threat Landscape

Started on Wednesday, May 6, 2020, 8:59 AM


State Finished
Completed on Wednesday, May 6, 2020, 9:01 AM
Time taken 1 min 56 secs
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.

Question 1 How long has the role of CISO been present?


Correct

1.00 points out Select one:


of 1.00
The role of CISO is the oldest C-level position.

The role of CISO has existed for 129 years.

The role of CISO is relatively new. 

The role of CISO does not exist yet.

Question 2 In many of the breaches, tens of millions of credit cards become compromised, and personally identifiable information for millions of
Correct individuals are stolen. What is one result?
1.00 points out
of 1.00 Select one:
Class-action lawsuits 

Market capitalization increase

Clearance sales

Increase in share price

Question 3 In what ways are CISOs often expected to represent the company?
Correct

1.00 points out Select one:


of 1.00
Thought leadership, partnership development, and customer engagement. 

Presenting new products at a trade show booth.

Public relations, advertising, and marketing.

Career day at a local school.

Question 4 Originally, the role of CISO was mostly concerned with which topic?
Correct

1.00 points out Select one:


of 1.00
Compliance 

Budgeting

Finance

Operations

https://training.fortinet.com/mod/quiz/review.php?attempt=3562257&cmid=3850 1/2
6/5/2020 Quiz

Question 5 What can be said for a company’s data that resides outside their buildings?
Correct

1.00 points out Select one:


of 1.00
It must be secured and protected just the same. 

It is impossible to even find.

It is already secured and protected by the very nature of the cloud.

It is impossible to secure or protect.

Question 6 What do the other C-level executives want from a CISO?


Correct

1.00 points out Select one:


of 1.00
A concrete assessment of vendor performance.

A concrete assessment of website costs.

A concrete assessment of information risk and value. 

A concrete assessment of database performance.

Question 7 What is the result of these breaches becoming the targets of government regulators?
Correct

1.00 points out Select one:


of 1.00
Lower insurance rates

Huge fines 

Unexpected tax audits

Increased health department inspections

Question 8 What is the term for when departments or individuals go outside the corporate policies and spin up their own applications, utilize
Correct unapproved or uncoordinated SaaS services, or otherwise allow what may be key information assets to be stored out of our control?
1.00 points out
of 1.00 Select one:
Vapor IT

Dodgy IT

Shadow IT 

Ninja IT

Question 9 What results from the loss of control of customers’ personally identifiable information?
Correct

1.00 points out Select one:


of 1.00
An increase in customer sympathy and a strengthening of brand reputation.

The loss of customer trust and a strengthening of brand reputation.

The loss of customer trust and lasting damage to brand reputation. 

A rise in customer-created crowdfunding initiatives.

Question 10 Where are the information assets in a typical company today?


Correct

1.00 points out Select one:


of 1.00
Stored in carefully controlled servers.

Consolidated in a central mainframe.

Scattered all over the place. 

Inside the main building.

https://training.fortinet.com/mod/quiz/review.php?attempt=3562257&cmid=3850 2/2

You might also like