in Education by
Which of the following is not considering the adequate measure for physical security? (a) Lock the drawers (b) Keep strong passwords for corporate laptops and mobile phones (c) Keep confidential organization’s document file open in the desk (d) Hide your hand against camera while inserting the PIN code I had been asked this question during an interview for a job. This intriguing question comes from Social Engineering and Physical Hacking in division Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct option is (c) Keep confidential organization’s document file open in the desk For explanation: Keeping confidential files left open in the desk is not an adequate way of maintaining physical security; as anyone can pick these up and perform physical hacking.

Related questions

0 votes
    Which of the following is not a physical security measure to protect against physical hacking? (a) Add front desk ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    ______________ takes advantage if hidden fields that work as the only security measure in some applications. (a ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an appropriate measure for securing social networking accounts? (a) Strong ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not physical layer vulnerability? (a) Physical theft of data & hardware (b) Physical ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of them is not an example of physical hacking? (a) Walk-in using piggybacking (b) Sneak-in (c) Break- ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of them is not an example of physical data leakage? (a) dumpster diving (b) shoulder surfing (c) printers ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
0 votes
    Which of the following do not comes under security measures for cloud in firms? (a) Firewall (b) Antivirus (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a security issue for PDAs? (a) Password theft (b) Data theft (c) ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Route spoofing ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a strong security protocol? (a) HTTPS (b) SSL (c) SMTP (d) SFTP I had been ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following will not help in preserving email security? (a) Create a strong password (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Cryptography offers a set of required security services. Which of the following is not among that 4 required ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...