Que.Stealing pen drives and DVDs after tailgating is an example of lack of _______ security. |
a. network security |
b. physical security |
c. database security |
d. wireless security |
Que.________ is the ability of an individual to gain physical access to an authorized area. |
a. Network accessing |
b. Database accessing |
c. Remote accessing |
d. Physical accessing |
Que.Which of the following is not considering the adequate measure for physical security? |
a. Lock the drawers |
b. Keep strong passwords for corporate laptops and mobile phones |
c. Keep confidential organization’s document file open in the desk |
d. Hide your hand against camera while inserting the PIN code |
Que.Which of the following is not a physical security measure to protect against physical hacking? |
a. Add front desk & restrict unknown access to the back room |
b. Create a phishing policy |
c. Analyze how employees maintain their physical data and data storage peripheral devices |
d. Updating the patches in the software you’re working at your office laptop. |
Que.IT security department must periodically check for security logs and entries made during office hours. |
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.Which of them is not an example of physical hacking? |
a. Walk-in using piggybacking |
b. Sneak-in |
c. Break-in and steal |
d. Phishing |
Que.Physical _________ is important to check & test for possible physical breaches. |
a. penetration test |
b. security check |
c. hacking |
d. access |
Que.___________ ensures the integrity and security of data that are passing over a network. |
a. Firewall |
b. Antivirus |
c. Pentesting Tools |
d. Network-security protocols |
Que.Which of the following is not a strong security protocol? |
a. HTTPS |
b. SSL |
c. SMTP |
d. SFTP |
Que.Which of the following is not a secured mail transferring methodology? |
a. POP3 |
b. SSMTP |
c. Mail using PGP |
d. S/MIME |