NSE1questions &answersblue Print
NSE1questions &answersblue Print
NSE1questions &answersblue Print
State Finished
Completed on Monday, April 13, 2020, 3:26 AM
Time taken 1 day 18 hours
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Zero-day exploits
First-day exploits
Phishing
Secret sauce
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
The appreciation of their country’s leaders
Political, social, or moral disagreements
The cost of commercial software and support
Food, wine, and gambling
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
DNS server
Ethernet switch
Transformer
Command & Control (C&C) Server
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Phishing
Baselining
Harpooning
Trolling
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Stable world markets
Peace through understanding
Intimidation through disruption and damage
Adoption of Bitcoin as a primary national currency
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Ideology
Food
Money
Notoriety
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Fortune
Fame
Ideology
Compassion
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Money
Ideology
Intimidation
Fame
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
What is the name of the malware that takes over a computer system and holds hostage
the disk drives or other data?
Select one:
Phishingware
Scareware
Ransomware
Kidnapware
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Money
The adoption of Bitcoin as a national currency
The political interest of their country’s government
Fame
Flag question
Question text
How does implementing multiple security point products from multiple vendors affect
managing an environment?
Select one:
Requires fewer staff members.
More complicated and more expensive.
Simpler and less expensive.
Saves money on rackspace and cooling costs.
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
Internally to the CIO’s company, what is the overall impact when a cyber attack causes
extended downtime, and employees’ time is diverted to post-attack activities?
Select one:
Overtime pay is approved.
Productivity is reduced.
Productivity is increased.
Morale is increased.
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
CIOs have the longest tenures among C-level executives.
CIOs have the shortest tenures among C-level executives.
The tenure of a CIO is a step on the path to CFO.
The tenure of a CIO is generally stress-free and relaxing.
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
Regulatory fines related to serious breaches can be characterized in which way?
Select one:
Fines are never imposed due to any form of cyber attacks.
They can be enormous and seriously impact the bottom line.
They are insignificant in all respects.
The proceeds help stimulate the economy.
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
What is becoming a regular topic between CIOs, the other C-level executives, and the
board of directors?
Select one:
Implementing cyber security
The allocation of window and corner offices.
Executive compensation
The relative value of various SaaS offerings.
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Creating all the information in a company.
Choosing which laptop models to purchase for a company.
Determining where each information resource will be routed in a company.
Controlling the Information Technology (IT) resources of a company.
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
What will a CIO do once they understand the company’s business goals and priorities?
Select one:
Analyze and design new products.
Create alternative business plans.
Attend many industry conferences.
Analyze and design the IT infrastructure so that it aligns with those business goals.
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Show how these investments deliver measurable results.
Compare budgets with other C-level executives.
Negotiate for quantity discounts.
Fill out the warranty cards right away.
Question 9
Incorrect
0.00 points out of 1.00
Flag question
Question text
When the general public learns of a serious breach, what is their likely reaction?
Select one:
Apathy leading to an increase in business with the breached company.
Disbelief followed shortly by acceptance.
Empathy and compassion.
An erosion of trust leading to a decline in business with the breached company.
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text
Why must a CIO work closely with the other C-level executives?
Select one:
To make sure they use strong passwords.
To understand the company’s business goals and priorities.
The other C-level execs always need help with their computers.
To help choose which laptops to purchase for the company.
Question text
Select one:
The role of CISO does not exist yet.
The role of CISO is the oldest C-level position.
The role of CISO has existed for 129 years.
The role of CISO is relatively new.
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
In many of the breaches, tens of millions of credit cards become compromised, and
personally identifiable information for millions of individuals are stolen. What is one
result?
Select one:
Market capitalization increase
Class-action lawsuits
Clearance sales
Increase in share price
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
In what ways are CISOs often expected to represent the company?
Select one:
Presenting new products at a trade show booth.
Thought leadership, partnership development, and customer engagement.
Career day at a local school.
Public relations, advertising, and marketing.
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
Originally, the role of CISO was mostly concerned with which topic?
Select one:
Compliance
Operations
Budgeting
Finance
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
What can be said for a company’s data that resides outside their buildings?
Select one:
It must be secured and protected just the same.
It is already secured and protected by the very nature of the cloud.
It is impossible to even find.
It is impossible to secure or protect.
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
A concrete assessment of database performance.
A concrete assessment of website costs.
A concrete assessment of information risk and value.
A concrete assessment of vendor performance.
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
What is the result of these breaches becoming the targets of government regulators?
Select one:
Huge fines
Increased health department inspections
Unexpected tax audits
Lower insurance rates
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
What is the term for when departments or individuals go outside the corporate policies
and spin up their own applications, utilize unapproved or uncoordinated SaaS services,
or otherwise allow what may be key information assets to be stored out of our control?
Select one:
Dodgy IT
Ninja IT
Vapor IT
Shadow IT
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
What results from the loss of control of customers’ personally identifiable information?
Select one:
A rise in customer-created crowdfunding initiatives.
The loss of customer trust and lasting damage to brand reputation.
The loss of customer trust and a strengthening of brand reputation.
An increase in customer sympathy and a strengthening of brand reputation.
Question 10
Incorrect
0.00 points out of 1.00
Flag question
Question text
Select one:
Inside the main building.
Scattered all over the place.
Consolidated in a central mainframe.
Stored in carefully controlled servers.
Flag question
Question text
A CFO’s responsibility is to manage financial risk, and that covers which other element?
Select one:
All the information and data in the company.
The after-hours card games.
The catered lunch in the boardroom.
Costs associated with the building’s janitorial contractor.
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Crafting a better user experience.
Regulatory fines.
Building brand loyalty.
Decreasing revenues.
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
How does a CFO treat intangible assets such as intellectual property, trade secrets,
manufacturing methods, and the information about customers?
Select one:
Not responsible at all.
Just as responsible for the financial risks to those information assets as any others.
More responsible for the financial risks to those information assets than any others.
Paper assets
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
Looking into the past, a CFO will create which kind of reports?
Select one:
Reporting on the prior financial performance of the company.
TPS reports
Billable hours
Timecard reports for individual employees.
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
Since it uses information from every corner of the business, what does a company’s
Enterprise Resource Planning (ERP) system require to help the CFO understand what’s
happening now, and plan for the future?
Select one:
Accurate and trustworthy information.
Several reams of paper.
A gaggle of consultants.
Last quarter’s TPS reports.
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
There are no consequences since nobody actually reads those reports.
Other CFOs in the area will catch the error and help fix it.
The next report must have an offsetting error to compensate.
From having to re-state the data, to being found in violation of financial regulations.
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
What does a CFO rely on to create forecasts of what will happen to the company in the
future?
Select one:
Advice of Wall Street analysts.
Access to good information.
An endless supply of coffee.
Accurate inventory data.
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
To manage the company’s payroll.
To manage the finances and the financial risks of the company.
To develop new products and services.
To oversee the factory floor.
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
What poses one of the greatest risks to the financial value of a company’s information
assets?
Select one:
Earthquakes
Cyber threats
Floods
Spelling errors
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text
What role does a CFO play in new business initiatives, product launches and/or new
service offerings?
Select one:
Analyzes the financial impact.
Provides advice on marketing.
Conducts focus group research.
Provides advice on engineering.
Flag question
Question text
Where can you download the highly-rated and free FortiClient security product from?
Select one:
Your favorite malware marketplace.
forticlient.com
freeforticlient.com
forticlientfree.com
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
Why is it a security problem if you use the same password for all the systems and
websites you use?
Select one:
The bad guys will give up too easily.
There will be uneven wear on your keyboard.
If the bad guys break into one of them, they have your password for all of them.
It increases the difficulty of brute force password attacks.
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
On a regular basis.
Never
Once in a blue moon.
Each time there is a total solar eclipse.
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
The latest social media tools may not work on the old operating system.
The hard drive may fail.
The computer may reboot.
Many cyber attacks exploit unpatched vulnerabilities in old, unsupported operating
systems.
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
10%
Over 50%
5%
99%
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
Two-factor authentication uses the combination of “something you know” with which
other element?
Select one:
Something you have.
Something you will never know.
Something you want.
Something you have forgotten.
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
Select one:
Wait for everyone else to do it.
Immediately reboot your computer.
Politely decline.
Enable and use two-factor authentication.
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
What action can be taken in advance to help protect your data from corruption from
malware?
Select one:
Buy a substantial amount of Bitcoin currency.
Set up regular backups.
Reboot your computer.
Disable all anti-virus software.
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
What is the recommendation for passwords on all the systems and websites that you
use?
Select one:
Use “123456” as your password on all systems and websites.
Use the same password for each system or website.
Use different passwords for each system or website.
Never change your passwords.
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text
When you receive an unsolicited email, what should you do if it has an attachment?
Select one:
Immediately reboot your computer.
Forward the email to all your friends.
Don’t open the attachment.
Open the attachment to learn how to make money online.