You are on page 1of 9

How does implementing multiple security point products from multiple vendors affect managing an

environment?
Select one:
Saves money on rackspace and cooling costs.
Requires fewer staff members.
Simpler and less expensive.

More complicated and more expensive.

Internally to the CIO’s company, what is the overall impact when a cyber attack causes extended
downtime, and employees’ time is diverted to post-attack activities?
Select one:
Productivity is increased.
Morale is increased.

Productivity is reduced.
Overtime pay is approved.

On average, how can a CIO’s tenure be characterized?


Select one:
The tenure of a CIO is a step on the path to CFO.
The tenure of a CIO is generally stress-free and relaxing.
CIOs have the longest tenures among C-level executives.

CIOs have the shortest tenures among C-level executives.

Regulatory fines related to serious breaches can be characterized in which way?


Select one:
The proceeds help stimulate the economy.
Fines are never imposed due to any form of cyber attacks.

They can be enormous and seriously impact the bottom line.


They are insignificant in all respects.
What is becoming a regular topic between CIOs, the other C-level executives, and the board of
directors?
Select one:
The relative value of various SaaS offerings.

Implementing cyber security


Executive compensation
The allocation of window and corner offices.

What is the primary responsibility of a CIO?


Select one:
Creating all the information in a company.
Determining where each information resource will be routed in a company.

Controlling the Information Technology (IT) resources of a company.


Choosing which laptop models to purchase for a company.

What will a CIO do once they understand the company’s business goals and priorities?
Select one:
Analyze and design new products.
Create alternative business plans.
Attend many industry conferences.

Analyze and design the IT infrastructure so that it aligns with those business goals.

When investments are made in IT infrastructure, what should a CIO do next?


Select one:
Negotiate for quantity discounts.

Show how these investments deliver measurable results.


Fill out the warranty cards right away.
Compare budgets with other C-level executives.
When the general public learns of a serious breach, what is their likely reaction?
Select one:
Disbelief followed shortly by acceptance.

An erosion of trust leading to a decline in business with the breached company.


Empathy and compassion.
Apathy leading to an increase in business with the breached comp

Why must a CIO work closely with the other C-level executives?
Select one:

To understand the company’s business goals and priorities.


To make sure they use strong passwords.
The other C-level execs always need help with their computers.
To help choose which laptops to purchase for the company.
How long has the role of CISO been present?
Select one:

The role of CISO is relatively new.


The role of CISO has existed for 129 years.
The role of CISO does not exist yet.
The role of CISO is the oldest C-level position.

In many of the breaches, tens of millions of credit cards become compromised, and personally
identifiable information for millions of individuals are stolen. What is one result?
Select one:
Clearance sales
Increase in share price

Class-action lawsuits
Market capitalization increase

In what ways are CISOs often expected to represent the company?


Select one:

Thought leadership, partnership development, and customer engagement.


Career day at a local school.
Presenting new products at a trade show booth.
Public relations, advertising, and marketing.

Originally, the role of CISO was mostly concerned with which topic?
Select one:

Compliance
Finance
Budgeting
Operations
What can be said for a company’s data that resides outside their buildings?
Select one:
It is impossible to even find.

It must be secured and protected just the same.


It is already secured and protected by the very nature of the cloud.
It is impossible to secure or protect.

What do the other C-level executives want from a CISO?


Select one:
A concrete assessment of database performance.
A concrete assessment of website costs.

A concrete assessment of information risk and value.


A concrete assessment of vendor performance.

What is the result of these breaches becoming the targets of government regulators?
Select one:
Lower insurance rates
Unexpected tax audits
Increased health department inspections

Huge fines

What is the term for when departments or individuals go outside the corporate policies and spin up
their own applications, utilize unapproved or uncoordinated SaaS services, or otherwise allow what
may be key information assets to be stored out of our control?
Select one:

Shadow IT
Dodgy IT
Vapor IT
Ninja IT
What results from the loss of control of customers’ personally identifiable information?
Select one:
A rise in customer-created crowdfunding initiatives.
The loss of customer trust and a strengthening of brand reputation.

The loss of customer trust and lasting damage to brand reputation.


An increase in customer sympathy and a strengthening of brand reputation.

Where are the information assets in a typical company today?


Select one:
Stored in carefully controlled servers.
Consolidated in a central mainframe.
Inside the main building.

Scattered all over the place.


fortinet NSE 1 The Threat Landscape Lesson 3
Estudia en línea en quizlet.com/_4x14oz

1. How long has the role of CISO been present? The role of CISO is
relatively new.
2. In many of the breaches, tens of millions of credit cards become compromised, and personally Class-action lawsuits
identifiable information for millions of individuals are stolen. What is one result?
3. In what ways are CISOs often expected to represent the company? Thought leadership,
partnership development,
and customer engagement.
4. Originally, the role of CISO was mostly concerned with which topic? Compliance
5. What do the other C-level executives want from a CISO? A concrete assessment of
information risk and value.
6. What is the result of these breaches becoming the targets of government regulators? Huge fines
7. What is the term for when departments or individuals go outside the corporate policies and spin up Shadow IT
their own applications, utilize unapproved or uncoordinated SaaS services, or otherwise allow what
may be key information assets to be stored out of our control?
fortinet NSE 1 The Threat Landscape Lesson 4 Quiz
Estudia en línea en quizlet.com/_4x1arj

1. Being trustworthy with customer data is now a part of which outcome? Building brand loyalty.
2. A CFO's responsibility is to manage financial risk, and that covers which other element? All the information and data in the
company. Correct
3. How does a CFO treat intangible assets such as intellectual property, trade secrets, Just as responsible for the financial
manufacturing methods, and the information about customers? risks to those information assets as
any others.
4. Looking into the past, a CFO will create which kind of reports? Reporting on the prior financial
performance of the company.
5. Since it uses information from every corner of the business, what does a company's Accurate and trustworthy
Enterprise Resource Planning (ERP) system require to help the CFO understand what's information.
happening now, and plan for the future?
6. What are the consequences if a CFO's reports are not accurate? From having to re-state the data, to
being found in violation of
financial regulations.
7. What does a CFO rely on to create forecasts of what will happen to the company in the Access to good information.
future?
8. What is the primary responsibility of a CFO? To manage the finances and the
financial risks of the company.
9. What poses one of the greatest risks to the financial value of a company's information Cyber threats
assets?
10. What role does a CFO play in new business initiatives, product launches and/or new service Analyzes the financial impact.
offerings?
Fortinet NSE 1
Estudia en línea en quizlet.com/_3qe2ir

1. Analyze and design What will a CIO do once they 14. The political What is the primary motive of the "Cyber
the IT infrastructure understand the company's business interest of their Warrior"?
so that it aligns with goals and priorities? country's
those business goals government
2. Attacking systems by Zero-day exploits 15. Political, social, Primary motivations of the Hacktivist
exploiting otherwise or moral
unknown and disagreements
unpatched
16. Productivity is Internally to the CIO's company, what is
vulnerabilities
reduced the overall impact when a cyber attack
3. CIOs have the On average, how can a CIO's tenure causes extended downtime, and
shortest tenures be characterized? employees' time is diverted to post-attack
among C-level activities?
executives.
17. Ransomware What is the name of the malware that takes
4. Command & Control What component is necessary to over a computer system and holds
Server (C&C) form a botnet? hostage the disk drives or other data?
5. Controlling the What is the primary responsibility of 18. Show how When investments are made in IT
Information a CIO these infrastructure, what should a CIO do next?
Technology (IT) investments
resources of a deliver
company measurable
results
6. An erosion of trust When the general public learns of a
leading to a decline serious breach, what is their likely 19. They can be Regulatory fines related to serious
in business with the reaction? enormous and breaches can be characterized in which
breached company seriously way?
impact the
7. Ideology What is the motivation of the "Cyber
bottom line.
Terrorist"?
20. To understand Why must a CIO work closely with the
8. Implementing cyber What is becoming a regular topic
the company's other C-level executives?
security between CIOs, the other C-level
business goals
executives, and the board or
and priorities.
directors?
9. Intimidation through What is the goal of the Cyber
disruption and Terrorist?
damage
10. Money What is the motive of the "Cyber
Criminal"?
11. More complicated How does implementing multiple
and more expensive security point products from multiple
vendors affect managing an
environment?
12. Notoriety What is the motivation of the bad
actor known as the "Explorer"?
13. Phishing What is it called when a fraudulent
email masquerades as a legitimate
communication in an attempt to get a
user to reveal sensitive information?

You might also like