The Threat Landscape
The Threat Landscape
The Threat Landscape
Flag question
Question text
Select one:
First-day exploits
Phishing
Secret sauce
Zero-day exploits
Question 2
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
The appreciation of their country’s leaders
Political, social, or moral disagreements
Food, wine, and gambling
The cost of commercial software and support
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
Transformer
DNS server
Command & Control (C&C) Server
Ethernet switch
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
Harpooning
Baselining
Phishing
Trolling
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
Adoption of Bitcoin as a primary national currency
Peace through understanding
Stable world markets
Intimidation through disruption and damage
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
Food
Money
Notoriety
Ideology
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
Fame
Intimidation
Ideology
Money
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the name of the malware that takes over a computer system and holds
hostage the disk drives or other data?
Select one:
Kidnapware
Phishingware
Scareware
Ransomware
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
The political interest of their country’s government
Money
Fame
The adoption of Bitcoin as a national currency
Started on Thursday, 23 January 2020, 2:48 PM
State Finished
Marks 10.00/10.00
Question 1
Correct
Flag question
Question text
How does implementing multiple security point products from multiple vendors
affect managing an environment?
Select one:
Question 2
Correct
Flag question
Question text
Internally to the CIO’s company, what is the overall impact when a cyber attack
causes extended downtime, and employees’ time is diverted to post-attack
activities?
Select one:
Morale is increased.
Productivity is reduced.
Productivity is increased.
Question 3
Correct
Flag question
Question text
Select one:
Question 4
Correct
Flag question
Question text
Regulatory fines related to serious breaches can be characterized in which way?
Select one:
Question 5
Correct
Flag question
Question text
What is becoming a regular topic between CIOs, the other C-level executives, and
the board of directors?
Select one:
Executive compensation
Question 6
Correct
Flag question
Question text
What is the primary responsibility of a CIO?
Select one:
Question 7
Correct
Flag question
Question text
What will a CIO do once they understand the company’s business goals and
priorities?
Select one:
Analyze and design the IT infrastructure so that it aligns with those business goals.
Question 8
Correct
Flag question
Question text
When investments are made in IT infrastructure, what should a CIO do next?
Select one:
Question 9
Correct
Flag question
Question text
When the general public learns of a serious breach, what is their likely reaction?
Select one:
Question 10
Correct
Flag question
Question text
Why must a CIO work closely with the other C-level executives?
Select one:
The other C-level execs always need help with their computers.
State Finished
Marks 9.00/10.00
Question 1
Incorrect
Flag question
Question text
Select one:
Question 2
Correct
Flag question
Question text
In many of the breaches, tens of millions of credit cards become compromised, and
personally identifiable information for millions of individuals are stolen. What is one
result?
Select one:
Class-action lawsuits
Clearance sales
Question 3
Correct
Flag question
Question text
Select one:
Question 4
Correct
Flag question
Question text
Originally, the role of CISO was mostly concerned with which topic?
Select one:
Finance
Budgeting
Operations
Compliance
Question 5
Correct
Flag question
Question text
What can be said for a company’s data that resides outside their buildings?
Select one:
Question 6
Correct
Flag question
Question text
Question 7
Correct
Flag question
Question text
Select one:
Huge fines
Question 8
Correct
Flag question
Question text
What is the term for when departments or individuals go outside the corporate
policies and spin up their own applications, utilize unapproved or uncoordinated
SaaS services, or otherwise allow what may be key information assets to be stored
out of our control?
Select one:
Vapor IT
Ninja IT
Shadow IT
Dodgy IT
Question 9
Correct
Flag question
Question text
Select one:
Question 10
Correct
Flag question
Question text
Where are the information assets in a typical company today?
Select one:
State Finished
Marks 10.00/10.00
Question 1
Correct
Flag question
Question text
A CFO’s responsibility is to manage financial risk, and that covers which other
element?
Select one:
Question 2
Correct
Flag question
Question text
Select one:
Decreasing revenues.
Question 3
Correct
Flag question
Question text
How does a CFO treat intangible assets such as intellectual property, trade secrets,
manufacturing methods, and the information about customers?
Select one:
More responsible for the financial risks to those information assets than any others.
Just as responsible for the financial risks to those information assets as any others.
Paper assets
Question 4
Correct
Flag question
Question text
Looking into the past, a CFO will create which kind of reports?
Select one:
TPS reports
Billable hours
Question 5
Correct
Flag question
Question text
Since it uses information from every corner of the business, what does a company’s
Enterprise Resource Planning (ERP) system require to help the CFO understand
what’s happening now, and plan for the future?
Select one:
A gaggle of consultants.
Question 6
Correct
Flag question
Question text
Select one:
Other CFOs in the area will catch the error and help fix it.
There are no consequences since nobody actually reads those reports.
Question 7
Correct
Flag question
Question text
What does a CFO rely on to create forecasts of what will happen to the company in
the future?
Select one:
Question 8
Correct
Flag question
Question text
Select one:
Question 9
Correct
Flag question
Question text
What poses one of the greatest risks to the financial value of a company’s
information assets?
Select one:
Cyber threats
Earthquakes
Floods
Spelling errors
Question 10
Correct
Flag question
Question text
What role does a CFO play in new business initiatives, product launches and/or new
service offerings?
Select one:
State Finished
Marks 10.00/10.00
Question 1
Correct
Flag question
Question text
Select one:
The latest social media tools may not work on the old operating system.
Question 2
Correct
Flag question
Question text
What tool can you use to help “remember” all your passwords?
Select one:
Vitamin E
A password manager.
A rubber band.
Question 3
Correct
Flag question
Question text
Where can you download the highly-rated and free FortiClient security product
from?
Select one:
freeforticlient.com
forticlient.com
forticlientfree.com
Question 4
Correct
Flag question
Question text
Select one:
Something you want.
Question 5
Correct
Flag question
Question text
What do you call an unsolicited email message that masquerades as coming from a
legitimate sender, and attempts to get you to disclose sensitive information or click
on a link?
Select one:
Phishing
Virus
Trojan
Malware
Question 6
Correct
Flag question
Question text
Politely decline.
Question 7
Correct
Flag question
Question text
When you receive an unsolicited email, what should you do if it has an attachment?
Select one:
Question 8
Correct
Flag question
Question text
What is the recommendation for passwords on all the systems and websites that
you use?
Select one:
Question 9
Correct
Flag question
Question text
What action can be taken in advance to help protect your data from corruption
from malware?
Select one:
Question 10
Correct
Flag question
Question text
Why is it a security problem if you use the same password for all the systems and
websites you use?
Select one:
If the bad guys break into one of them, they have your password for all of them.
State Finished
Marks 8.00/10.00
Question 1
Correct
Flag question
Question text
Select one:
Question 2
Correct
Flag question
Question text
If a vendor or website offers two-factor authentication, what is the recommended
action?
Select one:
Politely decline.
Question 3
Incorrect
Flag question
Question text
Where can you download the highly-rated and free FortiClient security product
from?
Select one:
freeforticlient.com
forticlientfree.com
forticlient.com
Question 4
Correct
Flag question
Question text
Why is it a security problem if you use the same password for all the systems and
websites you use?
Select one:
If the bad guys break into one of them, they have your password for all of them.
Question 5
Correct
Flag question
Question text
Select one:
The latest social media tools may not work on the old operating system.
Question 6
Incorrect
Flag question
Question text
Select one:
10%
Over 50%
99%
5%
Question 7
Correct
Flag question
Question text
To prevent spammers from learning that you’ve seen one of their emails, what
should you do?
Select one:
Set your email client to not automatically download the images in email messages.
Question 8
Correct
Flag question
Question text
When you receive an unsolicited email, what should you do if it has an attachment?
Select one:
Question 9
Correct
Flag question
Question text
What is the recommendation for passwords on all the systems and websites that
you use?
Select one:
Question 10
Correct
Flag question
Question text
Select one:
Never
On a regular basis.