You are on page 1of 2

11/4/2020 Quiz

 The Threat Landscape

Started on Saturday, April 11, 2020, 12:38 AM


State Finished
Completed on Saturday, April 11, 2020, 12:44 AM
Time taken 6 mins 16 secs
Points 9.00/10.00
Grade 90.00 out of 100.00
Feedback Congratulations, you have passed.

Question 1 How long has the role of CISO been present?


Correct

1.00 points out Select one:


of 1.00
The role of CISO does not exist yet.

The role of CISO is relatively new. 

The role of CISO has existed for 129 years.

The role of CISO is the oldest C-level position.

Question 2 In many of the breaches, tens of millions of credit cards become compromised, and personally identifiable information for millions of
Correct individuals are stolen. What is one result?
1.00 points out
of 1.00 Select one:
Clearance sales

Increase in share price

Market capitalization increase

Class-action lawsuits 

Question 3 In what ways are CISOs often expected to represent the company?
Correct

1.00 points out Select one:


of 1.00
Presenting new products at a trade show booth.

Thought leadership, partnership development, and customer engagement. 

Public relations, advertising, and marketing.

Career day at a local school.

Question 4 Originally, the role of CISO was mostly concerned with which topic?
Correct

1.00 points out Select one:


of 1.00
Compliance 

Finance

Budgeting

Operations

https://training.fortinet.com/mod/quiz/review.php?attempt=2841158&cmid=3850 1/2
11/4/2020 Quiz

Question 5 What can be said for a company’s data that resides outside their buildings?
Correct

1.00 points out Select one:


of 1.00
It is impossible to secure or protect.

It is already secured and protected by the very nature of the cloud.

It must be secured and protected just the same. 

It is impossible to even find.

Question 6 What do the other C-level executives want from a CISO?


Correct

1.00 points out Select one:


of 1.00
A concrete assessment of website costs.

A concrete assessment of database performance.

A concrete assessment of vendor performance.

A concrete assessment of information risk and value. 

Question 7 What is the result of these breaches becoming the targets of government regulators?
Correct

1.00 points out Select one:


of 1.00
Unexpected tax audits

Huge fines 

Lower insurance rates

Increased health department inspections

Question 8 What is the term for when departments or individuals go outside the corporate policies and spin up their own applications, utilize
Correct unapproved or uncoordinated SaaS services, or otherwise allow what may be key information assets to be stored out of our control?
1.00 points out
of 1.00 Select one:
Ninja IT

Shadow IT 

Dodgy IT

Vapor IT

Question 9 What results from the loss of control of customers’ personally identifiable information?
Correct

1.00 points out Select one:


of 1.00
An increase in customer sympathy and a strengthening of brand reputation.

A rise in customer-created crowdfunding initiatives.

The loss of customer trust and a strengthening of brand reputation.

The loss of customer trust and lasting damage to brand reputation. 

Question 10 Where are the information assets in a typical company today?


Incorrect

0.00 points out Select one:


of 1.00
Scattered all over the place.

Consolidated in a central mainframe.

Stored in carefully controlled servers.

Inside the main building. 

https://training.fortinet.com/mod/quiz/review.php?attempt=2841158&cmid=3850 2/2

You might also like