Professional Documents
Culture Documents
NSA-1 (The Threat Landscape) Lesson-3 (CISO PerspectivesPage) Answers
NSA-1 (The Threat Landscape) Lesson-3 (CISO PerspectivesPage) Answers
Select one:
In many of the breaches, tens of millions of credit cards become compromised, and personally
identifiable information for millions of individuals are stolen. What is one result?
Select one:
Clearance sales
Increase in share price
Class-action lawsuits
Market capitalization increase
Originally, the role of CISO was mostly concerned with which topic?
Select one:
Compliance
Finance
Budgeting
Operations
What can be said for a company’s data that resides outside their buildings?
Select one:
It is impossible to even find.
What is the result of these breaches becoming the targets of government regulators?
Select one:
Lower insurance rates
Unexpected tax audits
Increased health department inspections
Huge fines
What is the term for when departments or individuals go outside the corporate policies and spin up
their own applications, utilize unapproved or uncoordinated SaaS services, or otherwise allow what
may be key information assets to be stored out of our control?
Select one:
Shadow IT
Dodgy IT
Vapor IT
Ninja IT
What results from the loss of control of customers’ personally identifiable information?
Select one:
A rise in customer-created crowdfunding initiatives.
The loss of customer trust and a strengthening of brand reputation.