in Education by
Data leakage threats do not usually occur from which of the following? (a) Web and email (b) Mobile data storage (c) USB drives and laptops (d) Television This question was posed to me by my school teacher while I was bunking the class. The origin of the question is Security Phases topic in section Phases of Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct answer is (d) Television The explanation: Data leakage threats are common from web and emails, mobile data storage devices such as internal or external storage and memory cards, from USB drives and laptops.

Related questions

0 votes
0 votes
    Which of them is not an example of physical data leakage? (a) dumpster diving (b) shoulder surfing (c) printers ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of them is not an example of data leakage done using electronic communication with malicious intent? (a) Phishing ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of them is an example of physical data leakage? (a) Dumpster diving (b) MiTM (c) DDoS (d) Phishing ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Section 79 of the Indian IT Act declares that any 3^rd party information or personal data leakage in corporate firms ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Data leakage is popularly known as ___________ (a) data theft (b) data crack (c) low and slow data theft (d ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    There are __________ major types of data leakage. (a) 2 (b) 3 (c) 4 (d) 5 I got this question in a ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
     Unauthorized data leakage doesn't essentially mean intended or malicious. (a) True (b) False The question was ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Unintentional data leakage can still result in the same penalties and reputational damage. (a) True (b) False The ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    When leakage of data is done purposely or because of the lack of employee's concern toward confidential data is called ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    ________________ helps in protecting businesses against data breaches that may make threats to cloud. (a) Centrify (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Spyware is not a powerful & one of the most widespread threats on the internet. (a) True (b) False I ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...