Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

1/9/2020 Quiz

 The Threat Landscape

Started on Thursday, 9 January 2020, 4:56 AM


State Finished
Completed on Thursday, 9 January 2020, 4:58 AM
Time taken 2 mins 26 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.

Question 1 How long has the role of CISO been present?


Correct

Mark 1.00 out of Select one:


1.00
The role of CISO is relatively new. 

The role of CISO is the oldest C-level position.

The role of CISO does not exist yet.

The role of CISO has existed for 129 years.

Question 2 In many of the breaches, tens of millions of credit cards become compromised, and personally identifiable information for millions of
Correct individuals are stolen. What is one result?
Mark 1.00 out of
1.00 Select one:
Market capitalization increase

Increase in share price

Clearance sales

Class-action lawsuits 

Question 3 In what ways are CISOs often expected to represent the company?
Correct

Mark 1.00 out of Select one:


1.00
Public relations, advertising, and marketing.

Thought leadership, partnership development, and customer engagement. 

Career day at a local school.

Presenting new products at a trade show booth.

Question 4 Originally, the role of CISO was mostly concerned with which topic?
Correct

Mark 1.00 out of Select one:


1.00
Budgeting

Operations

Finance

Compliance 

https://training.fortinet.com/mod/quiz/review.php?attempt=2151849&cmid=3850 1/2
1/9/2020 Quiz

Question 5 What can be said for a company’s data that resides outside their buildings?
Correct

Mark 1.00 out of Select one:


1.00
It is impossible to even find.

It is already secured and protected by the very nature of the cloud.

It is impossible to secure or protect.

It must be secured and protected just the same. 

Question 6 What do the other C-level executives want from a CISO?


Correct

Mark 1.00 out of Select one:


1.00
A concrete assessment of website costs.

A concrete assessment of vendor performance.

A concrete assessment of information risk and value. 

A concrete assessment of database performance.

Question 7 What is the result of these breaches becoming the targets of government regulators?
Correct

Mark 1.00 out of Select one:


1.00
Unexpected tax audits

Increased health department inspections

Huge fines 

Lower insurance rates

Question 8 What is the term for when departments or individuals go outside the corporate policies and spin up their own applications, utilize
Correct unapproved or uncoordinated SaaS services, or otherwise allow what may be key information assets to be stored out of our control?
Mark 1.00 out of
1.00 Select one:
Dodgy IT

Ninja IT

Shadow IT 

Vapor IT

Question 9 What results from the loss of control of customers’ personally identifiable information?
Correct

Mark 1.00 out of Select one:


1.00
A rise in customer-created crowdfunding initiatives.

The loss of customer trust and lasting damage to brand reputation. 

The loss of customer trust and a strengthening of brand reputation.

An increase in customer sympathy and a strengthening of brand reputation.

Question 10 Where are the information assets in a typical company today?


Correct

Mark 1.00 out of Select one:


1.00
Inside the main building.

Stored in carefully controlled servers.

Consolidated in a central mainframe.

Scattered all over the place. 

https://training.fortinet.com/mod/quiz/review.php?attempt=2151849&cmid=3850 2/2

You might also like