in Education by
Stealing pen drives and DVDs after tailgating is an example of lack of _______ security. (a) network security (b) physical security (c) database security (d) wireless security The question was posed to me during an online exam. Asked question is from Social Engineering and Physical Hacking in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right option is (b) physical security The explanation is: When cyber-criminal gain access to an authorized area and steal pen drives and DVDs which contain sensitive information about an employee or about the organization, then it can be said that the physical security of the organization is weak.

Related questions

0 votes
    There are _______ major ways of stealing email information. (a) 2 (b) 3 (c) 4 (d) 5 I have ... Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Tailgating is also termed as ___________ (a) Piggybacking (b) Pretexting (c) Phishing (d) Baiting The question was ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of them is not an example of business email security tool? (a) Microsoft Office Trust Center (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of them is not an example of business email security tool? (a) Enlocked (b) RPost Office (c) MS ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    With the lack of boundary check, the program ends abnormally and leads to ___________ error. (a) logical (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Lack of access control policy is a _____________ (a) Bug (b) Threat (c) Vulnerability (d) Attack I have been ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    In _______________ attacks an attacker do not contact with authorizing party for stealing password. (a) passive ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Security bugs are also known as _______ (a) security defect (b) security problems (c) system defect (d) software ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
0 votes
    Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. (a) 65 (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Stealing of digital files comes under __________ of the Indian IT Act. (a) section 66-A (b) section 66-B (c ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...