Professional Documents
Culture Documents
Merge 1
Merge 1
environment?
Select one:
Saves money on rackspace and cooling costs.
Requires fewer staff members.
Simpler and less expensive.
Internally to the CIO’s company, what is the overall impact when a cyber attack causes extended
downtime, and employees’ time is diverted to post-attack activities?
Select one:
Productivity is increased.
Morale is increased.
Productivity is reduced.
Overtime pay is approved.
What will a CIO do once they understand the company’s business goals and priorities?
Select one:
Analyze and design new products.
Create alternative business plans.
Attend many industry conferences.
Analyze and design the IT infrastructure so that it aligns with those business goals.
Why must a CIO work closely with the other C-level executives?
Select one:
In many of the breaches, tens of millions of credit cards become compromised, and personally
identifiable information for millions of individuals are stolen. What is one result?
Select one:
Clearance sales
Increase in share price
Class-action lawsuits
Market capitalization increase
Originally, the role of CISO was mostly concerned with which topic?
Select one:
Compliance
Finance
Budgeting
Operations
What can be said for a company’s data that resides outside their buildings?
Select one:
It is impossible to even find.
What is the result of these breaches becoming the targets of government regulators?
Select one:
Lower insurance rates
Unexpected tax audits
Increased health department inspections
Huge fines
What is the term for when departments or individuals go outside the corporate policies and spin up
their own applications, utilize unapproved or uncoordinated SaaS services, or otherwise allow what
may be key information assets to be stored out of our control?
Select one:
Shadow IT
Dodgy IT
Vapor IT
Ninja IT
What results from the loss of control of customers’ personally identifiable information?
Select one:
A rise in customer-created crowdfunding initiatives.
The loss of customer trust and a strengthening of brand reputation.
1. How long has the role of CISO been present? The role of CISO is
relatively new.
2. In many of the breaches, tens of millions of credit cards become compromised, and personally Class-action lawsuits
identifiable information for millions of individuals are stolen. What is one result?
3. In what ways are CISOs often expected to represent the company? Thought leadership,
partnership development,
and customer engagement.
4. Originally, the role of CISO was mostly concerned with which topic? Compliance
5. What do the other C-level executives want from a CISO? A concrete assessment of
information risk and value.
6. What is the result of these breaches becoming the targets of government regulators? Huge fines
7. What is the term for when departments or individuals go outside the corporate policies and spin up Shadow IT
their own applications, utilize unapproved or uncoordinated SaaS services, or otherwise allow what
may be key information assets to be stored out of our control?
fortinet NSE 1 The Threat Landscape Lesson 4 Quiz
Estudia en línea en quizlet.com/_4x1arj
1. Being trustworthy with customer data is now a part of which outcome? Building brand loyalty.
2. A CFO's responsibility is to manage financial risk, and that covers which other element? All the information and data in the
company. Correct
3. How does a CFO treat intangible assets such as intellectual property, trade secrets, Just as responsible for the financial
manufacturing methods, and the information about customers? risks to those information assets as
any others.
4. Looking into the past, a CFO will create which kind of reports? Reporting on the prior financial
performance of the company.
5. Since it uses information from every corner of the business, what does a company's Accurate and trustworthy
Enterprise Resource Planning (ERP) system require to help the CFO understand what's information.
happening now, and plan for the future?
6. What are the consequences if a CFO's reports are not accurate? From having to re-state the data, to
being found in violation of
financial regulations.
7. What does a CFO rely on to create forecasts of what will happen to the company in the Access to good information.
future?
8. What is the primary responsibility of a CFO? To manage the finances and the
financial risks of the company.
9. What poses one of the greatest risks to the financial value of a company's information Cyber threats
assets?
10. What role does a CFO play in new business initiatives, product launches and/or new service Analyzes the financial impact.
offerings?
Fortinet NSE 1
Estudia en línea en quizlet.com/_3qe2ir
1. Analyze and design What will a CIO do once they 14. The political What is the primary motive of the "Cyber
the IT infrastructure understand the company's business interest of their Warrior"?
so that it aligns with goals and priorities? country's
those business goals government
2. Attacking systems by Zero-day exploits 15. Political, social, Primary motivations of the Hacktivist
exploiting otherwise or moral
unknown and disagreements
unpatched
16. Productivity is Internally to the CIO's company, what is
vulnerabilities
reduced the overall impact when a cyber attack
3. CIOs have the On average, how can a CIO's tenure causes extended downtime, and
shortest tenures be characterized? employees' time is diverted to post-attack
among C-level activities?
executives.
17. Ransomware What is the name of the malware that takes
4. Command & Control What component is necessary to over a computer system and holds
Server (C&C) form a botnet? hostage the disk drives or other data?
5. Controlling the What is the primary responsibility of 18. Show how When investments are made in IT
Information a CIO these infrastructure, what should a CIO do next?
Technology (IT) investments
resources of a deliver
company measurable
results
6. An erosion of trust When the general public learns of a
leading to a decline serious breach, what is their likely 19. They can be Regulatory fines related to serious
in business with the reaction? enormous and breaches can be characterized in which
breached company seriously way?
impact the
7. Ideology What is the motivation of the "Cyber
bottom line.
Terrorist"?
20. To understand Why must a CIO work closely with the
8. Implementing cyber What is becoming a regular topic
the company's other C-level executives?
security between CIOs, the other C-level
business goals
executives, and the board or
and priorities.
directors?
9. Intimidation through What is the goal of the Cyber
disruption and Terrorist?
damage
10. Money What is the motive of the "Cyber
Criminal"?
11. More complicated How does implementing multiple
and more expensive security point products from multiple
vendors affect managing an
environment?
12. Notoriety What is the motivation of the bad
actor known as the "Explorer"?
13. Phishing What is it called when a fraudulent
email masquerades as a legitimate
communication in an attempt to get a
user to reveal sensitive information?