50+ Phases of Security MCQ part-1

In this MCQ, we will explore the different phases of security. We will discuss the importance of each phase and how they work together to create a secure environment. We will also explore the different types of security threats and how to mitigate them.

Que._____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.
a. Database hacking
b. Data leakage
c. Data cracking
d. Data revealing
Que.Data leakage threats do not usually occur from which of the following?
a. Web and email
b. Mobile data storage
c. USB drives and laptops
d. Television
Que.Data leakage is popularly known as ___________
a. data theft
b. data crack
c. low and slow data theft
d. slow data theft
Que.There are __________ major types of data leakage.
a. 2
b. 3
c. 4
d. 5
Que.“Unauthorized” data leakage doesn’t essentially mean intended or malicious.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Unintentional data leakage can still result in the same penalties and reputational damage.
a. True
b. False
c. May be True or False
d. Can’t say
Que.When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.
a. Ill-intentional data leakage
b. Malfunctioned in database
c. A malfunction in online data
d. ill-intension of an outsider
Que.Which of them is not an example of physical data leakage?
a. dumpster diving
b. shoulder surfing
c. printers and photocopiers
d. phishing
Que.______________ is the unauthorized movement of data.
a. Data exfiltration
b. Data infiltration
c. Data cracking
d. Database hacking
Que.Which of them is an example of physical data leakage?
a. Dumpster diving
b. MiTM
c. DDoS
d. Phishing