MCQOPTIONS
Saved Bookmarks
This section includes 8 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of them is not an example of physical data leakage? |
| A. | dumpster diving |
| B. | shoulder surfing |
| C. | printers and photocopiers |
| D. | phishing |
| Answer» E. | |
| 2. |
When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization. |
| A. | Ill-intentional data leakage |
| B. | Malfunctioned in database |
| C. | A malfunction in online data |
| D. | ill-intension of an outsider |
| Answer» B. Malfunctioned in database | |
| 3. |
Unintentional data leakage can still result in the same penalties and reputational damage. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
“Unauthorized” data leakage doesn’t essentially mean intended or malicious. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 5. |
There are __________ major types of data leakage. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» C. 4 | |
| 6. |
Data leakage is popularly known as ___________ |
| A. | data theft |
| B. | data crack |
| C. | low and slow data theft |
| D. | slow data theft |
| Answer» D. slow data theft | |
| 7. |
Data leakage threats do not usually occur from which of the following? |
| A. | Web and email |
| B. | Mobile data storage |
| C. | USB drives and laptops |
| D. | Television |
| Answer» E. | |
| 8. |
_____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient. |
| A. | Database hacking |
| B. | Data leakage |
| C. | Data cracking |
| D. | Data revealing |
| Answer» C. Data cracking | |