Está en la página 1de 2

2/16/2020 Quiz

 The Threat Landscape

Started on Sunday, 16 February 2020, 5:00 AM


State Finished
Completed on Sunday, 16 February 2020, 5:03 AM
Time taken 3 mins 8 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.

Question 1 How long has the role of CISO been present?


Correct

Mark 1.00 out of Select one:


1.00
The role of CISO does not exist yet.

The role of CISO is relatively new. 

The role of CISO is the oldest C-level position.

The role of CISO has existed for 129 years.

Question 2 In many of the breaches, tens of millions of credit cards become compromised, and personally identifiable information for millions of
Correct individuals are stolen. What is one result?
Mark 1.00 out of
1.00 Select one:
Class-action lawsuits 

Clearance sales

Market capitalization increase

Increase in share price

Question 3 In what ways are CISOs often expected to represent the company?
Correct

Mark 1.00 out of Select one:


1.00
Thought leadership, partnership development, and customer engagement. 

Presenting new products at a trade show booth.

Career day at a local school.

Public relations, advertising, and marketing.

Question 4 Originally, the role of CISO was mostly concerned with which topic?
Correct

Mark 1.00 out of Select one:


1.00
Operations

Budgeting

Compliance 

Finance

https://training.fortinet.com/mod/quiz/review.php?attempt=2369273&cmid=3850 1/2
2/16/2020 Quiz

Question 5 What can be said for a company’s data that resides outside their buildings?
Correct

Mark 1.00 out of Select one:


1.00
It is already secured and protected by the very nature of the cloud.

It must be secured and protected just the same. 

It is impossible to even find.

It is impossible to secure or protect.

Question 6 What do the other C-level executives want from a CISO?


Correct

Mark 1.00 out of Select one:


1.00
A concrete assessment of information risk and value. 

A concrete assessment of vendor performance.

A concrete assessment of database performance.

A concrete assessment of website costs.

Question 7 What is the result of these breaches becoming the targets of government regulators?
Correct

Mark 1.00 out of Select one:


1.00
Lower insurance rates

Increased health department inspections

Unexpected tax audits

Huge fines 

Question 8 What is the term for when departments or individuals go outside the corporate policies and spin up their own applications, utilize
Correct unapproved or uncoordinated SaaS services, or otherwise allow what may be key information assets to be stored out of our control?
Mark 1.00 out of
1.00 Select one:
Shadow IT 

Dodgy IT

Ninja IT

Vapor IT

Question 9 What results from the loss of control of customers’ personally identifiable information?
Correct

Mark 1.00 out of Select one:


1.00
An increase in customer sympathy and a strengthening of brand reputation.

The loss of customer trust and lasting damage to brand reputation. 

The loss of customer trust and a strengthening of brand reputation.

A rise in customer-created crowdfunding initiatives.

Question 10 Where are the information assets in a typical company today?


Correct

Mark 1.00 out of Select one:


1.00
Inside the main building.

Consolidated in a central mainframe.

Stored in carefully controlled servers.

Scattered all over the place. 

https://training.fortinet.com/mod/quiz/review.php?attempt=2369273&cmid=3850 2/2