Recent questions tagged Cyber-security-mcq-with-answers

0 votes
    Data leakage is popularly known as ___________ (a) data theft (b) data crack (c) low and slow data theft (d ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    There are __________ major types of data leakage. (a) 2 (b) 3 (c) 4 (d) 5 I got this question in a ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
     Unauthorized data leakage doesn't essentially mean intended or malicious. (a) True (b) False The question was ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Unintentional data leakage can still result in the same penalties and reputational damage. (a) True (b) False The ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    When leakage of data is done purposely or because of the lack of employee's concern toward confidential data is called ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of them is not an example of physical data leakage? (a) dumpster diving (b) shoulder surfing (c) printers ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    ______________ is the unauthorized movement of data. (a) Data exfiltration (b) Data infiltration (c) Data cracking (d ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of them is an example of physical data leakage? (a) Dumpster diving (b) MiTM (c) DDoS (d) Phishing ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of them is not an example of data leakage done using electronic communication with malicious intent? (a) Phishing ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    The three steps of data loss prevention are - Identify, Discover and______________ (a) Classify (b) Clarify (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
...