Cyber Security Questions and Answers – Security Phases – Data Leakage and Prevention – 1

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Security Phases – Data Leakage and Prevention – 1”.

1. _____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.
a) Database hacking
b) Data leakage
c) Data cracking
d) Data revealing
View Answer

Answer: b
Explanation: Data leakage is the illicit transmission of data from inside an organization or personal system to an external location or recipient. The phrase is used for describing data that is transferred electronically or even physically.

2. Data leakage threats do not usually occur from which of the following?
a) Web and email
b) Mobile data storage
c) USB drives and laptops
d) Television
View Answer

Answer: d
Explanation: Data leakage threats are common from web and emails, mobile data storage devices such as internal or external storage and memory cards, from USB drives and laptops.

3. Data leakage is popularly known as ___________
a) data theft
b) data crack
c) low and slow data theft
d) slow data theft
View Answer

Answer: c
Explanation: Data leakage is also known as ‘low and slow data theft’, which is a massive issue for data security & the damage caused to any firm is enormous. Every day there is at least one report of data theft that occurs worldwide.
advertisement
advertisement

4. There are __________ major types of data leakage.
a) 2
b) 3
c) 4
d) 5
View Answer

Answer: b
Explanation: There are three major types of data leakage. These are – data breach by accident, data leak done by ill-intentioned employees and electronic communication with malicious intent.

5. “Unauthorized” data leakage doesn’t essentially mean intended or malicious.
a) True
b) False
View Answer

Answer: a
Explanation: “Unauthorized” data leakage doesn’t essentially mean intended or malicious. It has been found that the majority of data leakage incidents are accidental but the loss occurred are severe.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. Unintentional data leakage can still result in the same penalties and reputational damage.
a) True
b) False
View Answer

Answer: a
Explanation: “Unintentional” data leakage doesn’t essentially mean intended or malicious. It has been found that the majority of data leakage incidents are accidental but it can still result in the same penalties and reputational damage.

7. When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.
a) Ill-intentional data leakage
b) Malfunctioned in database
c) A malfunction in online data
d) ill-intension of an outsider
View Answer

Answer: a
Explanation: When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called Ill-intentional data leakage done by employees of an organization.
advertisement

8. Which of them is not an example of physical data leakage?
a) dumpster diving
b) shoulder surfing
c) printers and photocopiers
d) phishing
View Answer

Answer: d
Explanation: Physical data leakage can be done intentionally by criminal-minded people who can fetch data from dumpster diving, shoulder surfing, data mentioned in printed papers or taken out of photocopiers.

Sanfoundry Global Education & Learning Series – Cyber Security.

advertisement

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.