Sei sulla pagina 1di 19

The Threat Landscape

Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>


Started on Tuesday, May 26, 2020, 1:39 PM
State Finished
Completed on Tuesday, May 26, 2020, 1:42 PM
Time taken 3 mins 18 secs
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
1.00 points out of 1.00

Flag question

Question text

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also


known as:

Select one:
Secret sauce
Phishing
First-day exploits
Zero-day exploits 

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

What are the primary motivations of the “Hacktivist”?

Select one:
Political, social, or moral disagreements 
Food, wine, and gambling
The cost of commercial software and support
The appreciation of their country’s leaders

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

What central component is necessary to form a botnet?

Select one:
Transformer
Command & Control (C&C) Server 
Ethernet switch
DNS server

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

What is it called when a fraudulent email masquerades as a legitimate communication in an


attempt to get a user to reveal sensitive information?

Select one:
Baselining
Phishing 
Trolling
Harpooning
Question 5
Correct
1.00 points out of 1.00

Flag question

Question text

What is the goal of the “Cyber Terrorist”?

Select one:
Intimidation through disruption and damage 
Peace through understanding
Stable world markets
Adoption of Bitcoin as a primary national currency

Question 6
Correct
1.00 points out of 1.00

Flag question

Question text

What is the motivation of the bad actor known as the “Explorer”?

Select one:
Money
Notoriety 
Food
Ideology

Question 7
Correct
1.00 points out of 1.00
Flag question

Question text

What is the motivation of the “Cyber Terrorist”?

Select one:
Fame
Compassion
Fortune
Ideology 

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text

What is the motive of the “Cyber Criminal”?

Select one:
Intimidation
Fame
Money 
Ideology

Question 9
Correct
1.00 points out of 1.00

Flag question
Question text

What is the name of the malware that takes over a computer system and holds hostage the
disk drives or other data?

Select one:
Scareware
Phishingware
Ransomware 
Kidnapware

Question 10
Correct
1.00 points out of 1.00

Flag question

Question text

What is the primary motivation of the “Cyber Warrior”?

Select one:
Money
Fame
The adoption of Bitcoin as a national currency
The political interest of their country’s government 

In this lesson, you will learn what SOAR is and how it benefits network
security. In networks where the complexity and manual tasks delay responses
to cyber-attacks, SOAR automates an orchestrated response, which ensures
a timely neutralization of an attack or breach and relief to teams who suffer
from a skills shortage.
Tuesday, May 26,
2020, 1:57 PM
State Finished
Completed on Tuesday, May 26, 2020, 2:06 PM
Time taken 9 mins 22 secs
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
1.00 points out of 1.00

Flag question

Question text

How does implementing multiple security point products from multiple vendors affect
managing an environment?

Select one:
Requires fewer staff members.
Saves money on rackspace and cooling costs.
More complicated and more expensive. 
Simpler and less expensive.

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

Internally to the CIO’s company, what is the overall impact when a cyber attack causes
extended downtime, and employees’ time is diverted to post-attack activities?

Select one:
Morale is increased.
Productivity is increased.
Overtime pay is approved.
Productivity is reduced. 

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

On average, how can a CIO’s tenure be characterized?

Select one:
The tenure of a CIO is generally stress-free and relaxing.
CIOs have the shortest tenures among C-level executives. 
CIOs have the longest tenures among C-level executives.
The tenure of a CIO is a step on the path to CFO.

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

Regulatory fines related to serious breaches can be characterized in which way?

Select one:
The proceeds help stimulate the economy.
They can be enormous and seriously impact the bottom line. 
They are insignificant in all respects.
Fines are never imposed due to any form of cyber attacks.

Question 5
Correct
1.00 points out of 1.00

Flag question
Question text

What is becoming a regular topic between CIOs, the other C-level executives, and the board
of directors?

Select one:
Executive compensation
Implementing cyber security 
The allocation of window and corner offices.
The relative value of various SaaS offerings.

Question 6
Correct
1.00 points out of 1.00

Flag question

Question text

What is the primary responsibility of a CIO?

Select one:
Controlling the Information Technology (IT) resources of a company. 
Creating all the information in a company.
Determining where each information resource will be routed in a company.
Choosing which laptop models to purchase for a company.

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

What will a CIO do once they understand the company’s business goals and priorities?

Select one:
Attend many industry conferences.
Create alternative business plans.
Analyze and design the IT infrastructure so that it aligns with those business goals. 
Analyze and design new products.

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text

When investments are made in IT infrastructure, what should a CIO do next?

Select one:
Compare budgets with other C-level executives.
Negotiate for quantity discounts.
Show how these investments deliver measurable results. 
Fill out the warranty cards right away.

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

When the general public learns of a serious breach, what is their likely reaction?

Select one:
Empathy and compassion.
An erosion of trust leading to a decline in business with the breached company. 
Apathy leading to an increase in business with the breached company.
Disbelief followed shortly by acceptance.
Question 10
Correct
1.00 points out of 1.00

Flag question

Question text

Why must a CIO work closely with the other C-level executives?

Select one:
To understand the company’s business goals and priorities. 
The other C-level execs always need help with their computers.
To help choose which laptops to purchase for the company.
To make sure they use strong passwords.

The Threat Landscape


Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>
Started on Tuesday, May 26, 2020, 2:14 PM
State Finished
Completed on Tuesday, May 26, 2020, 2:25 PM
Time taken 11 mins 12 secs
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
1.00 points out of 1.00

Flag question

Question text

How long has the role of CISO been present?

Select one:
The role of CISO does not exist yet.
The role of CISO is the oldest C-level position.
The role of CISO has existed for 129 years.
The role of CISO is relatively new. 

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

In many of the breaches, tens of millions of credit cards become compromised, and
personally identifiable information for millions of individuals are stolen. What is one result?

Select one:
Increase in share price
Class-action lawsuits 
Clearance sales
Market capitalization increase

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

In what ways are CISOs often expected to represent the company?

Select one:
Presenting new products at a trade show booth.
Public relations, advertising, and marketing.
Thought leadership, partnership development, and customer engagement. 
Career day at a local school.

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

Originally, the role of CISO was mostly concerned with which topic?

Select one:
Budgeting
Operations
Finance
Compliance 

Question 5
Correct
1.00 points out of 1.00

Flag question

Question text

What can be said for a company’s data that resides outside their buildings?

Select one:
It is already secured and protected by the very nature of the cloud.
It is impossible to secure or protect.
It is impossible to even find.
It must be secured and protected just the same. 

Question 6
Correct
1.00 points out of 1.00
Flag question

Question text

What do the other C-level executives want from a CISO?

Select one:
A concrete assessment of vendor performance.
A concrete assessment of information risk and value. 
A concrete assessment of database performance.
A concrete assessment of website costs.

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

What is the result of these breaches becoming the targets of government regulators?

Select one:
Lower insurance rates
Increased health department inspections
Huge fines 
Unexpected tax audits

Question 8
Correct
1.00 points out of 1.00

Flag question
Question text

What is the term for when departments or individuals go outside the corporate policies and
spin up their own applications, utilize unapproved or uncoordinated SaaS services, or
otherwise allow what may be key information assets to be stored out of our control?

Select one:
Shadow IT 
Vapor IT
Ninja IT
Dodgy IT

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

What results from the loss of control of customers’ personally identifiable information?

Select one:
A rise in customer-created crowdfunding initiatives.
An increase in customer sympathy and a strengthening of brand reputation.
The loss of customer trust and lasting damage to brand reputation. 
The loss of customer trust and a strengthening of brand reputation.

Question 10
Correct
1.00 points out of 1.00

Flag question

Question text

Where are the information assets in a typical company today?


Select one:
Consolidated in a central mainframe.
Stored in carefully controlled servers.
Scattered all over the place. 
Inside the main building.

Started on Wednesday, May 27, 2020, 10:14 AM


State Finished
Completed on Wednesday, May 27, 2020, 10:19 AM
Time taken 4 mins 53 secs
Points 9.00/10.00
Grade 90.00 out of 100.00
Feedback Congratulations, you passed.
Question 1
Correct
1.00 points out of 1.00

Flag question

Question text

Two-factor authentication uses the combination of “something you know” with which other
element?

Select one:
Something you have. 
Something you want.
Something you will never know.
Something you have forgotten.

Question 2
Correct
1.00 points out of 1.00
Flag question

Question text

When you receive an unsolicited email, what should you do if it has an attachment?

Select one:
Forward the email to all your friends.
Don’t open the attachment. 
Open the attachment to learn how to make money online.
Immediately reboot your computer.

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

What action can be taken in advance to help protect your data from corruption from
malware?

Select one:
Reboot your computer.
Disable all anti-virus software.
Set up regular backups. 
Buy a substantial amount of Bitcoin currency.

Question 4
Incorrect
0.00 points out of 1.00

Flag question
Question text

What percentage of malware is distributed by email?

Select one:
99% 
10%
Over 50%
5%

Question 5
Correct
1.00 points out of 1.00

Flag question

Question text

What should you do if you get an unsolicited email from an otherwise trusted source that
says to click a link?

Select one:
Launch a browser or app manually, then log into their website to investigate the issue. 
Immediately reboot your computer.
Reply to the email message.
Click on the link to learn how to make money online.

Question 6
Correct
1.00 points out of 1.00

Flag question

Question text

To prevent spammers from learning that you’ve seen one of their emails, what should you
do?
Select one:
Set your email client to not automatically download the images in email messages. 
Immediately reboot your computer.
Reply to the sender of the email message.
Delete the email message.

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

Why is it risky to keep using an operating system that is no longer supported or updated?

Select one:
Many cyber attacks exploit unpatched vulnerabilities in old, unsupported operating
systems. 
The latest social media tools may not work on the old operating system.
The hard drive may fail.
The computer may reboot.

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text

What is the recommendation for passwords on all the systems and websites that you use?

Select one:
Never change your passwords.
Use the same password for each system or website.
Use different passwords for each system or website. 
Use “123456” as your password on all systems and websites.

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

Where can you download the highly-rated and free FortiClient security product from?

Select one:
freeforticlient.com
Your favorite malware marketplace.
forticlientfree.com
forticlient.com 

Question 10
Correct
1.00 points out of 1.00

Flag question

Question text

How often should you change your passwords?

Select one:
On a regular basis. 
Once in a blue moon.
Never
Each time there is a total solar eclipse.

Potrebbero piacerti anche