You are on page 1of 1

Fortinet NSE 1

Estudia en línea en quizlet.com/_3qe2ir

1. Analyze and design What will a CIO do once they 14. The political What is the primary motive of the "Cyber
the IT infrastructure understand the company's business interest of their Warrior"?
so that it aligns with goals and priorities? country's
those business goals government
2. Attacking systems by Zero-day exploits 15. Political, social, Primary motivations of the Hacktivist
exploiting otherwise or moral
unknown and disagreements
unpatched
16. Productivity is Internally to the CIO's company, what is
vulnerabilities
reduced the overall impact when a cyber attack
3. CIOs have the On average, how can a CIO's tenure causes extended downtime, and
shortest tenures be characterized? employees' time is diverted to post-attack
among C-level activities?
executives.
17. Ransomware What is the name of the malware that takes
4. Command & Control What component is necessary to over a computer system and holds
Server (C&C) form a botnet? hostage the disk drives or other data?
5. Controlling the What is the primary responsibility of 18. Show how When investments are made in IT
Information a CIO these infrastructure, what should a CIO do next?
Technology (IT) investments
resources of a deliver
company measurable
results
6. An erosion of trust When the general public learns of a
leading to a decline serious breach, what is their likely 19. They can be Regulatory fines related to serious
in business with the reaction? enormous and breaches can be characterized in which
breached company seriously way?
impact the
7. Ideology What is the motivation of the "Cyber
bottom line.
Terrorist"?
20. To understand Why must a CIO work closely with the
8. Implementing cyber What is becoming a regular topic
the company's other C-level executives?
security between CIOs, the other C-level
business goals
executives, and the board or
and priorities.
directors?
9. Intimidation through What is the goal of the Cyber
disruption and Terrorist?
damage
10. Money What is the motive of the "Cyber
Criminal"?
11. More complicated How does implementing multiple
and more expensive security point products from multiple
vendors affect managing an
environment?
12. Notoriety What is the motivation of the bad
actor known as the "Explorer"?
13. Phishing What is it called when a fraudulent
email masquerades as a legitimate
communication in an attempt to get a
user to reveal sensitive information?

You might also like