

MCQOPTIONS
Saved Bookmarks
This section includes 8 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of them is not an example of physical data leakage? |
A. | dumpster diving |
B. | shoulder surfing |
C. | printers and photocopiers |
D. | phishing |
Answer» E. | |
2. |
When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization. |
A. | Ill-intentional data leakage |
B. | Malfunctioned in database |
C. | A malfunction in online data |
D. | ill-intension of an outsider |
Answer» B. Malfunctioned in database | |
3. |
Unintentional data leakage can still result in the same penalties and reputational damage. |
A. | True |
B. | False |
Answer» B. False | |
4. |
“Unauthorized” data leakage doesn’t essentially mean intended or malicious. |
A. | True |
B. | False |
Answer» B. False | |
5. |
There are __________ major types of data leakage. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» C. 4 | |
6. |
Data leakage is popularly known as ___________ |
A. | data theft |
B. | data crack |
C. | low and slow data theft |
D. | slow data theft |
Answer» D. slow data theft | |
7. |
Data leakage threats do not usually occur from which of the following? |
A. | Web and email |
B. | Mobile data storage |
C. | USB drives and laptops |
D. | Television |
Answer» E. | |
8. |
_____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient. |
A. | Database hacking |
B. | Data leakage |
C. | Data cracking |
D. | Data revealing |
Answer» C. Data cracking | |