Fortinet NSE 1 Lesson3-CISO Perspectives Quiz

Q1. How long has the role of CISO been present?

Select one:
The role of CISO is the oldest C-level position.
The role of CISO does not exist yet.
The role of CISO has existed for 129 years.
The role of CISO is relatively new.

Q2. In many of the breaches, tens of millions of credit cards become compromised, and personally identifiable information for millions of individuals are stolen. What is one result?

Select one:
Increase in share price
Market capitalization increase
Class-action lawsuits
Clearance sales

Q3. In what ways are CISOs often expected to represent the company?

Select one:
Public relations, advertising, and marketing.
Career day at a local school.
Presenting new products at a trade show booth.
Thought leadership, partnership development, and customer engagement.

Q4. Originally, the role of CISO was mostly concerned with which topic?

Select one:
Compliance
Budgeting
Finance
Operations

Q5. What can be said for a company’s data that resides outside their buildings?

Select one:
It is impossible to even find.
It must be secured and protected just the same.
It is already secured and protected by the very nature of the cloud.
It is impossible to secure or protect.

Q6. What do the other C-level executives want from a CISO?

Select one:
A concrete assessment of vendor performance.
A concrete assessment of information risk and value.
A concrete assessment of website costs.
A concrete assessment of database performance.

Q7. What is the result of these breaches becoming the targets of government regulators?

Select one:
Lower insurance rates
Huge fines
Increased health department inspections
Unexpected tax audits

Q8. What is the term for when departments or individuals go outside the corporate policies and spin up their own applications, utilize unapproved or uncoordinated SaaS services, or otherwise allow what may be key information assets to be stored out of our control?

Select one:
Shadow IT
Dodgy IT
Vapor IT
Ninja IT

Q9. What results from the loss of control of customers’ personally identifiable information?

Select one:
The loss of customer trust and lasting damage to brand reputation.
The loss of customer trust and a strengthening of brand reputation.
An increase in customer sympathy and a strengthening of brand reputation.
A rise in customer-created crowdfunding initiatives.

Q10. Where are the information assets in a typical company today?

Select one:
Consolidated in a central mainframe.
Inside the main building.
Scattered all over the place.
Stored in carefully controlled servers.