Sunteți pe pagina 1din 35

The Threat Landscape

Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>


Started on Thursday, 23 January 2020, 2:30 PM
State Finished
Completed on Thursday, 23 January 2020, 2:37 PM
Time taken 7 mins 5 secs
Marks 9.00/10.00
Grade 90.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities


is also known as:

Select one:
First-day exploits
Phishing
Secret sauce
Zero-day exploits

Question 2
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What are the primary motivations of the “Hacktivist”?

Select one:
The appreciation of their country’s leaders
Political, social, or moral disagreements
Food, wine, and gambling
The cost of commercial software and support

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What central component is necessary to form a botnet?

Select one:
Transformer
DNS server
Command & Control (C&C) Server
Ethernet switch

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is it called when a fraudulent email masquerades as a legitimate


communication in an attempt to get a user to reveal sensitive information?

Select one:
Harpooning
Baselining
Phishing
Trolling

Question 5
Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the goal of the “Cyber Terrorist”?

Select one:
Adoption of Bitcoin as a primary national currency
Peace through understanding
Stable world markets
Intimidation through disruption and damage

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the motivation of the bad actor known as the “Explorer”?

Select one:
Food
Money
Notoriety
Ideology

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the motivation of the “Cyber Terrorist”?


Select one:
Compassion
Fortune
Ideology
Fame

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the motive of the “Cyber Criminal”?

Select one:
Fame
Intimidation
Ideology
Money

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the name of the malware that takes over a computer system and holds
hostage the disk drives or other data?

Select one:
Kidnapware
Phishingware
Scareware
Ransomware

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the primary motivation of the “Cyber Warrior”?

Select one:
The political interest of their country’s government
Money
Fame
The adoption of Bitcoin as a national currency
Started on Thursday, 23 January 2020, 2:48 PM

State Finished

Completed on Thursday, 23 January 2020, 2:58 PM

Time taken 10 mins 40 secs

Marks 10.00/10.00

Grade 100.00 out of 100.00

Feedback Congratulations, you have passed.

Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text

How does implementing multiple security point products from multiple vendors
affect managing an environment?

Select one:

Saves money on rackspace and cooling costs.

Requires fewer staff members.

More complicated and more expensive.

Simpler and less expensive.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Internally to the CIO’s company, what is the overall impact when a cyber attack
causes extended downtime, and employees’ time is diverted to post-attack
activities?

Select one:

Overtime pay is approved.

Morale is increased.

Productivity is reduced.

Productivity is increased.

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text

On average, how can a CIO’s tenure be characterized?

Select one:

The tenure of a CIO is a step on the path to CFO.

The tenure of a CIO is generally stress-free and relaxing.

CIOs have the longest tenures among C-level executives.

CIOs have the shortest tenures among C-level executives.

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Regulatory fines related to serious breaches can be characterized in which way?

Select one:

Fines are never imposed due to any form of cyber attacks.

They are insignificant in all respects.

They can be enormous and seriously impact the bottom line.

The proceeds help stimulate the economy.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is becoming a regular topic between CIOs, the other C-level executives, and
the board of directors?

Select one:

Executive compensation

The allocation of window and corner offices.

The relative value of various SaaS offerings.

Implementing cyber security

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the primary responsibility of a CIO?

Select one:

Creating all the information in a company.

Controlling the Information Technology (IT) resources of a company.

Choosing which laptop models to purchase for a company.

Determining where each information resource will be routed in a company.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What will a CIO do once they understand the company’s business goals and
priorities?

Select one:

Attend many industry conferences.

Analyze and design new products.

Analyze and design the IT infrastructure so that it aligns with those business goals.

Create alternative business plans.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
When investments are made in IT infrastructure, what should a CIO do next?

Select one:

Compare budgets with other C-level executives.

Negotiate for quantity discounts.

Show how these investments deliver measurable results.

Fill out the warranty cards right away.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text

When the general public learns of a serious breach, what is their likely reaction?

Select one:

Disbelief followed shortly by acceptance.

An erosion of trust leading to a decline in business with the breached company.

Empathy and compassion.

Apathy leading to an increase in business with the breached company.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Why must a CIO work closely with the other C-level executives?
Select one:

To make sure they use strong passwords.

To understand the company’s business goals and priorities.

The other C-level execs always need help with their computers.

To help choose which laptops to purchase for the company.


Started on Thursday, 23 January 2020, 2:59 PM

State Finished

Completed on Thursday, 23 January 2020, 3:08 PM

Time taken 8 mins 38 secs

Marks 9.00/10.00

Grade 90.00 out of 100.00

Feedback Congratulations, you have passed.

Question 1
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

How long has the role of CISO been present?

Select one:

The role of CISO is relatively new.

The role of CISO does not exist yet.

The role of CISO is the oldest C-level position.

The role of CISO has existed for 129 years.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In many of the breaches, tens of millions of credit cards become compromised, and
personally identifiable information for millions of individuals are stolen. What is one
result?

Select one:

Increase in share price

Market capitalization increase

Class-action lawsuits

Clearance sales

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text

In what ways are CISOs often expected to represent the company?

Select one:

Career day at a local school.

Presenting new products at a trade show booth.

Thought leadership, partnership development, and customer engagement.

Public relations, advertising, and marketing.

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Originally, the role of CISO was mostly concerned with which topic?

Select one:

Finance

Budgeting

Operations

Compliance

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What can be said for a company’s data that resides outside their buildings?

Select one:

It is impossible to even find.

It is impossible to secure or protect.

It must be secured and protected just the same.

It is already secured and protected by the very nature of the cloud.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What do the other C-level executives want from a CISO?


Select one:

A concrete assessment of information risk and value.

A concrete assessment of website costs.

A concrete assessment of vendor performance.

A concrete assessment of database performance.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the result of these breaches becoming the targets of government


regulators?

Select one:

Lower insurance rates

Unexpected tax audits

Increased health department inspections

Huge fines

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the term for when departments or individuals go outside the corporate
policies and spin up their own applications, utilize unapproved or uncoordinated
SaaS services, or otherwise allow what may be key information assets to be stored
out of our control?

Select one:

Vapor IT

Ninja IT

Shadow IT

Dodgy IT

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What results from the loss of control of customers’ personally identifiable


information?

Select one:

The loss of customer trust and lasting damage to brand reputation.

A rise in customer-created crowdfunding initiatives.

The loss of customer trust and a strengthening of brand reputation.

An increase in customer sympathy and a strengthening of brand reputation.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Where are the information assets in a typical company today?

Select one:

Inside the main building.

Scattered all over the place.

Stored in carefully controlled servers.

Consolidated in a central mainframe.

Started on Thursday, 23 January 2020, 3:09 PM

State Finished

Completed on Thursday, 23 January 2020, 3:12 PM


Time taken 2 mins 55 secs

Marks 10.00/10.00

Grade 100.00 out of 100.00

Feedback Congratulations, you have passed.

Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A CFO’s responsibility is to manage financial risk, and that covers which other
element?

Select one:

Costs associated with the building’s janitorial contractor.

All the information and data in the company.

The after-hours card games.

The catered lunch in the boardroom.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Being trustworthy with customer data is now a part of which outcome?

Select one:

Crafting a better user experience.


Regulatory fines.

Building brand loyalty.

Decreasing revenues.

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text

How does a CFO treat intangible assets such as intellectual property, trade secrets,
manufacturing methods, and the information about customers?

Select one:

More responsible for the financial risks to those information assets than any others.

Not responsible at all.

Just as responsible for the financial risks to those information assets as any others.

Paper assets

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Looking into the past, a CFO will create which kind of reports?

Select one:

Reporting on the prior financial performance of the company.


Timecard reports for individual employees.

TPS reports

Billable hours

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Since it uses information from every corner of the business, what does a company’s
Enterprise Resource Planning (ERP) system require to help the CFO understand
what’s happening now, and plan for the future?

Select one:

A gaggle of consultants.

Several reams of paper.

Accurate and trustworthy information.

Last quarter’s TPS reports.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What are the consequences if a CFO’s reports are not accurate?

Select one:

Other CFOs in the area will catch the error and help fix it.
There are no consequences since nobody actually reads those reports.

The next report must have an offsetting error to compensate.

From having to re-state the data, to being found in violation of financial


regulations.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What does a CFO rely on to create forecasts of what will happen to the company in
the future?

Select one:

Access to good information.

Advice of Wall Street analysts.

Accurate inventory data.

An endless supply of coffee.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the primary responsibility of a CFO?

Select one:

To develop new products and services.


To manage the finances and the financial risks of the company.

To oversee the factory floor.

To manage the company’s payroll.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What poses one of the greatest risks to the financial value of a company’s
information assets?

Select one:

Cyber threats

Earthquakes

Floods

Spelling errors

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What role does a CFO play in new business initiatives, product launches and/or new
service offerings?

Select one:

Provides advice on engineering.


Conducts focus group research.

Provides advice on marketing.

Analyzes the financial impact.

Started on Thursday, 23 January 2020, 3:12 PM

State Finished

Completed on Thursday, 23 January 2020, 3:20 PM


Time taken 7 mins 51 secs

Marks 10.00/10.00

Grade 100.00 out of 100.00

Feedback Congratulations, you passed.

Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Why is it risky to keep using an operating system that is no longer supported or


updated?

Select one:

The computer may reboot.

The hard drive may fail.

Many cyber attacks exploit unpatched vulnerabilities in old, unsupported operating


systems.

The latest social media tools may not work on the old operating system.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What tool can you use to help “remember” all your passwords?

Select one:
Vitamin E

Yellow sticky notes.

A password manager.

A rubber band.

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Where can you download the highly-rated and free FortiClient security product
from?

Select one:

freeforticlient.com

forticlient.com

forticlientfree.com

Your favorite malware marketplace.

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Two-factor authentication uses the combination of “something you know” with


which other element?

Select one:
Something you want.

Something you have forgotten.

Something you will never know.

Something you have.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What do you call an unsolicited email message that masquerades as coming from a
legitimate sender, and attempts to get you to disclose sensitive information or click
on a link?

Select one:

Phishing

Virus

Trojan

Malware

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text

If a vendor or website offers two-factor authentication, what is the recommended


action?
Select one:

Wait for everyone else to do it.

Politely decline.

Enable and use two-factor authentication.

Immediately reboot your computer.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text

When you receive an unsolicited email, what should you do if it has an attachment?

Select one:

Open the attachment to learn how to make money online.

Don’t open the attachment.

Forward the email to all your friends.

Immediately reboot your computer.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the recommendation for passwords on all the systems and websites that
you use?
Select one:

Use the same password for each system or website.

Never change your passwords.

Use “123456” as your password on all systems and websites.

Use different passwords for each system or website.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What action can be taken in advance to help protect your data from corruption
from malware?

Select one:

Reboot your computer.

Buy a substantial amount of Bitcoin currency.

Set up regular backups.

Disable all anti-virus software.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Why is it a security problem if you use the same password for all the systems and
websites you use?
Select one:

There will be uneven wear on your keyboard.

If the bad guys break into one of them, they have your password for all of them.

The bad guys will give up too easily.

It increases the difficulty of brute force password attacks.


Started on Thursday, 23 January 2020, 7:39 PM

State Finished

Completed on Thursday, 23 January 2020, 7:47 PM

Time taken 7 mins 59 secs

Marks 8.00/10.00

Grade 80.00 out of 100.00

Feedback Congratulations, you passed.

Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Two-factor authentication uses the combination of “something you know” with


which other element?

Select one:

Something you will never know.

Something you have.

Something you have forgotten.

Something you want.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
If a vendor or website offers two-factor authentication, what is the recommended
action?

Select one:

Immediately reboot your computer.

Wait for everyone else to do it.

Politely decline.

Enable and use two-factor authentication.

Question 3
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Where can you download the highly-rated and free FortiClient security product
from?

Select one:

freeforticlient.com

forticlientfree.com

Your favorite malware marketplace.

forticlient.com

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Why is it a security problem if you use the same password for all the systems and
websites you use?

Select one:

It increases the difficulty of brute force password attacks.

If the bad guys break into one of them, they have your password for all of them.

The bad guys will give up too easily.

There will be uneven wear on your keyboard.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Why is it risky to keep using an operating system that is no longer supported or


updated?

Select one:

The hard drive may fail.

Many cyber attacks exploit unpatched vulnerabilities in old, unsupported operating


systems.

The computer may reboot.

The latest social media tools may not work on the old operating system.

Question 6
Incorrect

Mark 0.00 out of 1.00

Flag question
Question text

What percentage of malware is distributed by email?

Select one:

10%

Over 50%

99%

5%

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text

To prevent spammers from learning that you’ve seen one of their emails, what
should you do?

Select one:

Set your email client to not automatically download the images in email messages.

Immediately reboot your computer.

Delete the email message.

Reply to the sender of the email message.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question
Question text

When you receive an unsolicited email, what should you do if it has an attachment?

Select one:

Don’t open the attachment.

Immediately reboot your computer.

Open the attachment to learn how to make money online.

Forward the email to all your friends.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the recommendation for passwords on all the systems and websites that
you use?

Select one:

Use the same password for each system or website.

Use different passwords for each system or website.

Use “123456” as your password on all systems and websites.

Never change your passwords.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question
Question text

How often should you change your passwords?

Select one:

Each time there is a total solar eclipse.

Never

Once in a blue moon.

On a regular basis.

S-ar putea să vă placă și