Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Flag question
Question text
Select one:
Secret sauce
Phishing
First-day exploits
Zero-day exploits
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Political, social, or moral disagreements
Food, wine, and gambling
The cost of commercial software and support
The appreciation of their country’s leaders
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Transformer
Command & Control (C&C) Server
Ethernet switch
DNS server
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Baselining
Phishing
Trolling
Harpooning
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Intimidation through disruption and damage
Peace through understanding
Stable world markets
Adoption of Bitcoin as a primary national currency
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Money
Notoriety
Food
Ideology
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Fame
Compassion
Fortune
Ideology
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Intimidation
Fame
Money
Ideology
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
What is the name of the malware that takes over a computer system and holds hostage the
disk drives or other data?
Select one:
Scareware
Phishingware
Ransomware
Kidnapware
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Money
Fame
The adoption of Bitcoin as a national currency
The political interest of their country’s government
In this lesson, you will learn what SOAR is and how it benefits network
security. In networks where the complexity and manual tasks delay responses
to cyber-attacks, SOAR automates an orchestrated response, which ensures
a timely neutralization of an attack or breach and relief to teams who suffer
from a skills shortage.
Tuesday, May 26,
2020, 1:57 PM
State Finished
Completed on Tuesday, May 26, 2020, 2:06 PM
Time taken 9 mins 22 secs
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
1.00 points out of 1.00
Flag question
Question text
How does implementing multiple security point products from multiple vendors affect
managing an environment?
Select one:
Requires fewer staff members.
Saves money on rackspace and cooling costs.
More complicated and more expensive.
Simpler and less expensive.
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
Internally to the CIO’s company, what is the overall impact when a cyber attack causes
extended downtime, and employees’ time is diverted to post-attack activities?
Select one:
Morale is increased.
Productivity is increased.
Overtime pay is approved.
Productivity is reduced.
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
The tenure of a CIO is generally stress-free and relaxing.
CIOs have the shortest tenures among C-level executives.
CIOs have the longest tenures among C-level executives.
The tenure of a CIO is a step on the path to CFO.
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
The proceeds help stimulate the economy.
They can be enormous and seriously impact the bottom line.
They are insignificant in all respects.
Fines are never imposed due to any form of cyber attacks.
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
What is becoming a regular topic between CIOs, the other C-level executives, and the board
of directors?
Select one:
Executive compensation
Implementing cyber security
The allocation of window and corner offices.
The relative value of various SaaS offerings.
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Controlling the Information Technology (IT) resources of a company.
Creating all the information in a company.
Determining where each information resource will be routed in a company.
Choosing which laptop models to purchase for a company.
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
What will a CIO do once they understand the company’s business goals and priorities?
Select one:
Attend many industry conferences.
Create alternative business plans.
Analyze and design the IT infrastructure so that it aligns with those business goals.
Analyze and design new products.
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Compare budgets with other C-level executives.
Negotiate for quantity discounts.
Show how these investments deliver measurable results.
Fill out the warranty cards right away.
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
When the general public learns of a serious breach, what is their likely reaction?
Select one:
Empathy and compassion.
An erosion of trust leading to a decline in business with the breached company.
Apathy leading to an increase in business with the breached company.
Disbelief followed shortly by acceptance.
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text
Why must a CIO work closely with the other C-level executives?
Select one:
To understand the company’s business goals and priorities.
The other C-level execs always need help with their computers.
To help choose which laptops to purchase for the company.
To make sure they use strong passwords.
Flag question
Question text
Select one:
The role of CISO does not exist yet.
The role of CISO is the oldest C-level position.
The role of CISO has existed for 129 years.
The role of CISO is relatively new.
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
In many of the breaches, tens of millions of credit cards become compromised, and
personally identifiable information for millions of individuals are stolen. What is one result?
Select one:
Increase in share price
Class-action lawsuits
Clearance sales
Market capitalization increase
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Presenting new products at a trade show booth.
Public relations, advertising, and marketing.
Thought leadership, partnership development, and customer engagement.
Career day at a local school.
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
Originally, the role of CISO was mostly concerned with which topic?
Select one:
Budgeting
Operations
Finance
Compliance
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
What can be said for a company’s data that resides outside their buildings?
Select one:
It is already secured and protected by the very nature of the cloud.
It is impossible to secure or protect.
It is impossible to even find.
It must be secured and protected just the same.
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
A concrete assessment of vendor performance.
A concrete assessment of information risk and value.
A concrete assessment of database performance.
A concrete assessment of website costs.
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
What is the result of these breaches becoming the targets of government regulators?
Select one:
Lower insurance rates
Increased health department inspections
Huge fines
Unexpected tax audits
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
What is the term for when departments or individuals go outside the corporate policies and
spin up their own applications, utilize unapproved or uncoordinated SaaS services, or
otherwise allow what may be key information assets to be stored out of our control?
Select one:
Shadow IT
Vapor IT
Ninja IT
Dodgy IT
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
What results from the loss of control of customers’ personally identifiable information?
Select one:
A rise in customer-created crowdfunding initiatives.
An increase in customer sympathy and a strengthening of brand reputation.
The loss of customer trust and lasting damage to brand reputation.
The loss of customer trust and a strengthening of brand reputation.
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text
Flag question
Question text
Two-factor authentication uses the combination of “something you know” with which other
element?
Select one:
Something you have.
Something you want.
Something you will never know.
Something you have forgotten.
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
When you receive an unsolicited email, what should you do if it has an attachment?
Select one:
Forward the email to all your friends.
Don’t open the attachment.
Open the attachment to learn how to make money online.
Immediately reboot your computer.
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
What action can be taken in advance to help protect your data from corruption from
malware?
Select one:
Reboot your computer.
Disable all anti-virus software.
Set up regular backups.
Buy a substantial amount of Bitcoin currency.
Question 4
Incorrect
0.00 points out of 1.00
Flag question
Question text
Select one:
99%
10%
Over 50%
5%
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
What should you do if you get an unsolicited email from an otherwise trusted source that
says to click a link?
Select one:
Launch a browser or app manually, then log into their website to investigate the issue.
Immediately reboot your computer.
Reply to the email message.
Click on the link to learn how to make money online.
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
To prevent spammers from learning that you’ve seen one of their emails, what should you
do?
Select one:
Set your email client to not automatically download the images in email messages.
Immediately reboot your computer.
Reply to the sender of the email message.
Delete the email message.
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
Why is it risky to keep using an operating system that is no longer supported or updated?
Select one:
Many cyber attacks exploit unpatched vulnerabilities in old, unsupported operating
systems.
The latest social media tools may not work on the old operating system.
The hard drive may fail.
The computer may reboot.
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
What is the recommendation for passwords on all the systems and websites that you use?
Select one:
Never change your passwords.
Use the same password for each system or website.
Use different passwords for each system or website.
Use “123456” as your password on all systems and websites.
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
Where can you download the highly-rated and free FortiClient security product from?
Select one:
freeforticlient.com
Your favorite malware marketplace.
forticlientfree.com
forticlient.com
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
On a regular basis.
Once in a blue moon.
Never
Each time there is a total solar eclipse.