NSE1questions &answersblue Print

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 23

Started on Saturday, April 11, 2020, 9:01 AM

State Finished
Completed on Monday, April 13, 2020, 3:26 AM
Time taken 1 day 18 hours
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
1.00 points out of 1.00

Flag question

Question text

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also


known as:

Select one:
Zero-day exploits 
First-day exploits
Phishing
Secret sauce

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

What are the primary motivations of the “Hacktivist”?

Select one:
The appreciation of their country’s leaders
Political, social, or moral disagreements 
The cost of commercial software and support
Food, wine, and gambling
Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

What central component is necessary to form a botnet?

Select one:
DNS server
Ethernet switch
Transformer
Command & Control (C&C) Server 

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

What is it called when a fraudulent email masquerades as a legitimate communication in


an attempt to get a user to reveal sensitive information?

Select one:
Phishing 
Baselining
Harpooning
Trolling

Question 5
Correct
1.00 points out of 1.00

Flag question
Question text

What is the goal of the “Cyber Terrorist”?

Select one:
Stable world markets
Peace through understanding
Intimidation through disruption and damage 
Adoption of Bitcoin as a primary national currency

Question 6
Correct
1.00 points out of 1.00

Flag question

Question text

What is the motivation of the bad actor known as the “Explorer”?

Select one:
Ideology
Food
Money
Notoriety 

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

What is the motivation of the “Cyber Terrorist”?

Select one:
Fortune
Fame
Ideology 
Compassion

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text

What is the motive of the “Cyber Criminal”?

Select one:
Money 
Ideology
Intimidation
Fame

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

What is the name of the malware that takes over a computer system and holds hostage
the disk drives or other data?

Select one:
Phishingware
Scareware
Ransomware 
Kidnapware

Question 10
Correct
1.00 points out of 1.00
Flag question

Question text

What is the primary motivation of the “Cyber Warrior”?

Select one:
Money
The adoption of Bitcoin as a national currency
The political interest of their country’s government 
Fame

Started on Monday, April 13, 2020, 3:30 AM


State Finished
Completed on Monday, April 13, 2020, 3:34 AM
Time taken 3 mins 23 secs
Points 9.00/10.00
Grade 90.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
1.00 points out of 1.00

Flag question

Question text

How does implementing multiple security point products from multiple vendors affect
managing an environment?

Select one:
Requires fewer staff members.
More complicated and more expensive. 
Simpler and less expensive.
Saves money on rackspace and cooling costs.

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

Internally to the CIO’s company, what is the overall impact when a cyber attack causes
extended downtime, and employees’ time is diverted to post-attack activities?

Select one:
Overtime pay is approved.
Productivity is reduced. 
Productivity is increased.
Morale is increased.

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

On average, how can a CIO’s tenure be characterized?

Select one:
CIOs have the longest tenures among C-level executives.
CIOs have the shortest tenures among C-level executives. 
The tenure of a CIO is a step on the path to CFO.
The tenure of a CIO is generally stress-free and relaxing.

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text
Regulatory fines related to serious breaches can be characterized in which way?

Select one:
Fines are never imposed due to any form of cyber attacks.
They can be enormous and seriously impact the bottom line. 
They are insignificant in all respects.
The proceeds help stimulate the economy.

Question 5
Correct
1.00 points out of 1.00

Flag question

Question text

What is becoming a regular topic between CIOs, the other C-level executives, and the
board of directors?

Select one:
Implementing cyber security 
The allocation of window and corner offices.
Executive compensation
The relative value of various SaaS offerings.

Question 6
Correct
1.00 points out of 1.00

Flag question

Question text

What is the primary responsibility of a CIO?

Select one:
Creating all the information in a company.
Choosing which laptop models to purchase for a company.
Determining where each information resource will be routed in a company.
Controlling the Information Technology (IT) resources of a company. 

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

What will a CIO do once they understand the company’s business goals and priorities?

Select one:
Analyze and design new products.
Create alternative business plans.
Attend many industry conferences.
Analyze and design the IT infrastructure so that it aligns with those business goals. 

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text

When investments are made in IT infrastructure, what should a CIO do next?

Select one:
Show how these investments deliver measurable results. 
Compare budgets with other C-level executives.
Negotiate for quantity discounts.
Fill out the warranty cards right away.

Question 9
Incorrect
0.00 points out of 1.00
Flag question

Question text

When the general public learns of a serious breach, what is their likely reaction?

Select one:
Apathy leading to an increase in business with the breached company. 
Disbelief followed shortly by acceptance.
Empathy and compassion.
An erosion of trust leading to a decline in business with the breached company.

Question 10
Correct
1.00 points out of 1.00

Flag question

Question text

Why must a CIO work closely with the other C-level executives?

Select one:
To make sure they use strong passwords.
To understand the company’s business goals and priorities. 
The other C-level execs always need help with their computers.
To help choose which laptops to purchase for the company.

Started on Monday, April 13, 2020, 3:48 AM


State Finished
Completed on Monday, April 13, 2020, 3:54 AM
Time taken 6 mins 27 secs
Points 9.00/10.00
Grade 90.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
1.00 points out of 1.00
Flag question

Question text

How long has the role of CISO been present?

Select one:
The role of CISO does not exist yet.
The role of CISO is the oldest C-level position.
The role of CISO has existed for 129 years.
The role of CISO is relatively new. 

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

In many of the breaches, tens of millions of credit cards become compromised, and
personally identifiable information for millions of individuals are stolen. What is one
result?

Select one:
Market capitalization increase
Class-action lawsuits 
Clearance sales
Increase in share price

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text
In what ways are CISOs often expected to represent the company?

Select one:
Presenting new products at a trade show booth.
Thought leadership, partnership development, and customer engagement. 
Career day at a local school.
Public relations, advertising, and marketing.

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

Originally, the role of CISO was mostly concerned with which topic?

Select one:
Compliance 
Operations
Budgeting
Finance

Question 5
Correct
1.00 points out of 1.00

Flag question

Question text

What can be said for a company’s data that resides outside their buildings?

Select one:
It must be secured and protected just the same. 
It is already secured and protected by the very nature of the cloud.
It is impossible to even find.
It is impossible to secure or protect.
Question 6
Correct
1.00 points out of 1.00

Flag question

Question text

What do the other C-level executives want from a CISO?

Select one:
A concrete assessment of database performance.
A concrete assessment of website costs.
A concrete assessment of information risk and value. 
A concrete assessment of vendor performance.

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

What is the result of these breaches becoming the targets of government regulators?

Select one:
Huge fines 
Increased health department inspections
Unexpected tax audits
Lower insurance rates

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text
What is the term for when departments or individuals go outside the corporate policies
and spin up their own applications, utilize unapproved or uncoordinated SaaS services,
or otherwise allow what may be key information assets to be stored out of our control?

Select one:
Dodgy IT
Ninja IT
Vapor IT
Shadow IT 

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

What results from the loss of control of customers’ personally identifiable information?

Select one:
A rise in customer-created crowdfunding initiatives.
The loss of customer trust and lasting damage to brand reputation. 
The loss of customer trust and a strengthening of brand reputation.
An increase in customer sympathy and a strengthening of brand reputation.

Question 10
Incorrect
0.00 points out of 1.00

Flag question

Question text

Where are the information assets in a typical company today?

Select one:
Inside the main building. 
Scattered all over the place.
Consolidated in a central mainframe.
Stored in carefully controlled servers.

tarted on Monday, April 13, 2020, 4:28 AM


State Finished
Completed on Monday, April 13, 2020, 4:31 AM
Time taken 3 mins 50 secs
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
1.00 points out of 1.00

Flag question

Question text

A CFO’s responsibility is to manage financial risk, and that covers which other element?

Select one:
All the information and data in the company. 
The after-hours card games.
The catered lunch in the boardroom.
Costs associated with the building’s janitorial contractor.

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

Being trustworthy with customer data is now a part of which outcome?

Select one:
Crafting a better user experience.
Regulatory fines.
Building brand loyalty. 
Decreasing revenues.

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

How does a CFO treat intangible assets such as intellectual property, trade secrets,
manufacturing methods, and the information about customers?

Select one:
Not responsible at all.
Just as responsible for the financial risks to those information assets as any others. 
More responsible for the financial risks to those information assets than any others.
Paper assets

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

Looking into the past, a CFO will create which kind of reports?

Select one:
Reporting on the prior financial performance of the company. 
TPS reports
Billable hours
Timecard reports for individual employees.

Question 5
Correct
1.00 points out of 1.00
Flag question

Question text

Since it uses information from every corner of the business, what does a company’s
Enterprise Resource Planning (ERP) system require to help the CFO understand what’s
happening now, and plan for the future?

Select one:
Accurate and trustworthy information. 
Several reams of paper.
A gaggle of consultants.
Last quarter’s TPS reports.

Question 6
Correct
1.00 points out of 1.00

Flag question

Question text

What are the consequences if a CFO’s reports are not accurate?

Select one:
There are no consequences since nobody actually reads those reports.
Other CFOs in the area will catch the error and help fix it.
The next report must have an offsetting error to compensate.
From having to re-state the data, to being found in violation of financial regulations. 

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text
What does a CFO rely on to create forecasts of what will happen to the company in the
future?

Select one:
Advice of Wall Street analysts.
Access to good information. 
An endless supply of coffee.
Accurate inventory data.

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text

What is the primary responsibility of a CFO?

Select one:
To manage the company’s payroll.
To manage the finances and the financial risks of the company. 
To develop new products and services.
To oversee the factory floor.

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

What poses one of the greatest risks to the financial value of a company’s information
assets?

Select one:
Earthquakes
Cyber threats 
Floods
Spelling errors

Question 10
Correct
1.00 points out of 1.00

Flag question

Question text

What role does a CFO play in new business initiatives, product launches and/or new
service offerings?

Select one:
Analyzes the financial impact. 
Provides advice on marketing.
Conducts focus group research.
Provides advice on engineering.

tarted on Monday, April 13, 2020, 4:14 AM


State Finished
Completed on Monday, April 13, 2020, 4:55 AM
Time taken 41 mins 2 secs
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you passed.
Question 1
Correct
1.00 points out of 1.00

Flag question

Question text

Where can you download the highly-rated and free FortiClient security product from?

Select one:
Your favorite malware marketplace.
forticlient.com 
freeforticlient.com
forticlientfree.com

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

Why is it a security problem if you use the same password for all the systems and
websites you use?

Select one:
The bad guys will give up too easily.
There will be uneven wear on your keyboard.
If the bad guys break into one of them, they have your password for all of them. 
It increases the difficulty of brute force password attacks.

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

How often should you change your passwords?

Select one:
On a regular basis. 
Never
Once in a blue moon.
Each time there is a total solar eclipse.

Question 4
Correct
1.00 points out of 1.00
Flag question

Question text

Why is it risky to keep using an operating system that is no longer supported or


updated?

Select one:
The latest social media tools may not work on the old operating system.
The hard drive may fail.
The computer may reboot.
Many cyber attacks exploit unpatched vulnerabilities in old, unsupported operating
systems. 

Question 5
Correct
1.00 points out of 1.00

Flag question

Question text

What percentage of malware is distributed by email?

Select one:
10%
Over 50% 
5%
99%

Question 6
Correct
1.00 points out of 1.00

Flag question

Question text
Two-factor authentication uses the combination of “something you know” with which
other element?

Select one:
Something you have. 
Something you will never know.
Something you want.
Something you have forgotten.

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

If a vendor or website offers two-factor authentication, what is the recommended


action?

Select one:
Wait for everyone else to do it.
Immediately reboot your computer.
Politely decline.
Enable and use two-factor authentication. 

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text

What action can be taken in advance to help protect your data from corruption from
malware?

Select one:
Buy a substantial amount of Bitcoin currency.
Set up regular backups. 
Reboot your computer.
Disable all anti-virus software.

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

What is the recommendation for passwords on all the systems and websites that you
use?

Select one:
Use “123456” as your password on all systems and websites.
Use the same password for each system or website.
Use different passwords for each system or website. 
Never change your passwords.

Question 10
Correct
1.00 points out of 1.00

Flag question

Question text

When you receive an unsolicited email, what should you do if it has an attachment?

Select one:
Immediately reboot your computer.
Forward the email to all your friends.
Don’t open the attachment. 
Open the attachment to learn how to make money online.

You might also like