logo
  • Home
  • Rank
  • Tests
  • About
  • Training
  • Programming
  • CS
  • IT
  • IS
  • ECE
  • EEE
  • EE
  • Civil
  • Mechanical
  • Chemical
  • Metallurgy
  • Instrumentation
  • Aeronautical
  • Aerospace
  • Biotechnology
  • Agriculture
  • MCA
  • BCA
  • Internship
  • Contact

Cyber Security Multiple Choice Questions | MCQs | Quiz

Cyber Security Interview Questions and Answers
Practice Cyber Security questions and answers for interviews, campus placements, online tests, aptitude tests, quizzes and competitive exams.

Get Started

•   Hacking History
•   Hackers Types
•   Cyber Attacks Types
•   Security Elements
•   Security Technologies
•   Generic Security Steps - 1
•   Generic Security Steps - 2
•   Physical Hacking
•   Security Protocols - 1
•   Security Protocols - 2
•   Hacking Terminologies - 1
•   Hacking Terminologies - 2
•   Ports & Its Types - 1
•   Ports & Its Types - 2
•   Firewalls - 1
•   Firewalls - 2
•   VPNs
•   Linux OS & Its Security
•   Buffer Overflow - 1
•   Buffer Overflow - 2
•   Enumerating-Cyber Security
•   Hacking & Security Skills
•   Fingerprinting
•   Exploits & Exploitation
•   Cyber & IT laws - 1
•   Cyber & IT laws - 2
•   Security Tools - 1
•   Security Tools - 2
•   Bugs & Vulnerabilities
•   Ethical Hacking Ethics
•   Security Breach
•   Corporate Cyber Security
•   OSI Model Security - 1
•   OSI Model Security - 2
•   TCP-IP Model Security
•   Data Leakage - 1
•   Data Leakage - 2
•   Information Techniques - 1
•   Information Techniques - 2
•   Security Scanning Phase-1
•   Security Scanning Phase-2
•   Email Security - 1
•   Email Security - 2
•   Password Cracking - 1
•   Password Cracking - 2
•   Windows Security
•   Mobile Phone Security
•   Wireless Security
•   Virus & Worms
•   Trojans & Backdoors - 1
•   Trojans & Backdoors - 2
•   Botnets
•   Digital Privacy
•   DoS & DDoS
•   Phishing & Its Types
•   Sniffing
•   Session Hijacking
•   Web Server Attacks
•   Application Vulnerabilities
•   Adwares
•   Spywares
•   Reverse Engineering - 1
•   Reverse Engineering - 2
•   DNS Hacking & Security
•   Caches & Cookies
•   Social Networking Security
•   Spamming
•   Cryptography Types - 1
•   Cryptography Types - 2
•   Ciphers & Its Security
•   Steganography Security
•   Tor Services
•   Anonymity & Pseudonymity
•   Deep Web & Darknet

« Prev Page
Next Page »

Cyber Security Questions and Answers – Data Leakage and Prevention – 1

Posted on February 11, 2019 by Manish

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Data Leakage and Prevention – 1”.

1. _____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.
a) Database hacking
b) Data leakage
c) Data cracking
d) Data revealing
View Answer

Answer: b
Explanation: Data leakage is the illicit transmission of data from inside an organization or personal system to an external location or recipient. The phrase is used for describing data which is transferred electronically or even physically.
advertisement

2. Data leakage threats do not usually occur from which of the following?
a) Web and email
b) Mobile data storage
c) USB drives and laptops
d) Television
View Answer

Answer: d
Explanation: Data leakage threats are common from web and emails, mobile data storage devices such as internal or external storage and memory cards, from USB drives and laptops.

3. Data leakage is popularly known as ___________
a) data theft
b) data crack
c) low and slow data theft
d) slow data theft
View Answer

Answer: c
Explanation: Data leakage is also known as ‘low and slow data theft’, which is a massive issue for data security & the damage caused to any firm is enormous. Every day there is at least one report of data theft that occurs worldwide.

4. There are __________ major types of data leakage.
a) 2
b) 3
c) 4
d) 5
View Answer

Answer: b
Explanation: There are three major types of data leakage. These are – data breach by accident, data leak done by ill-intentioned employees and electronic communication with malicious intent.
advertisement

5. “Unauthorized” data leakage doesn’t essentially mean intended or malicious.
a) True
b) False
View Answer

Answer: a
Explanation: “Unauthorized” data leakage doesn’t essentially mean intended or malicious. It has been found that the majority of data leakage incidents are accidental but the loss occurred are severe.

6. Unintentional data leakage can still result in the same penalties and reputational damage.
a) True
b) False
View Answer

Answer: a
Explanation: “Unintentional” data leakage doesn’t essentially mean intended or malicious. It has been found that the majority of data leakage incidents are accidental but it can still result in the same penalties and reputational damage.

7. When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.
a) Ill-intentional data leakage
b) Malfunctioned in database
c) A malfunction in online data
d) ill-intension of an outsider
View Answer

Answer: a
Explanation: When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called Ill-intentional data leakage done by employees of an organization.
advertisement

8. Which of them is not an example of physical data leakage?
a) dumpster diving
b) shoulder surfing
c) printers and photocopiers
d) phishing
View Answer

Answer: d
Explanation: Physical data leakage can be done intentionally by criminal-minded people who can fetch data from dumpster diving, shoulder surfing, data mentioned in printed papers or taken out of photocopiers.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

« Prev Page - Cyber Security Questions and Answers – TCP-IP Model Security
» Next Page - Cyber Security Questions and Answers – Data Leakage and Prevention – 2

« Cyber Security Questions and Answers – TCP-IP Model Security
Cyber Security Questions and Answers – Data Leakage and Prevention – 2 »
advertisement

Deep Dive @ Sanfoundry:

  1. Java Programming Examples on Collections
  2. Data Science Questions and Answers
  3. C Programming Examples on Stacks & Queues
  4. Data Structure Questions and Answers
  5. C++ Programming Examples on Data-Structures
  6. Cryptography and Network Security Questions and Answers
  7. Java Programming Examples on Data-Structures
  8. C# Programming Examples on Data Structures
  9. C Programming Examples on Data-Structures
  10. Cyber Security Questions and Answers
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer and SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage & Cluster Administration, Advanced C Programming, SAN Storage Technologies, SCSI Internals and Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him below:
LinkedIn | Facebook | Twitter | Google+

Best Careers

Developer Tracks
SAN Developer
Linux Kernel Developer
Linux Driver Developer
Linux Network Developer

Live Training Photos
Mentoring
Software Productivity
GDB Assignment
Sanfoundry is No. 1 choice for Deep Hands-ON Trainings in SAN, Linux & C, Kernel Programming. Our Founder has trained employees of almost all Top Companies in India such as VMware, Citrix, Oracle, Motorola, Ericsson, Aricent, HP, Intuit, Microsoft, Cisco, SAP Labs, Siemens, Symantec, Redhat, Chelsio, Cavium, ST-Micro, Samsung, LG-Soft, Wipro, TCS, HCL, IBM, Accenture, HSBC, Mphasis, Tata-Elxsi, Tata VSNL, Mindtree, Cognizant and Startups.

Best Trainings

SAN I - Technology
SAN II - Admin
Linux Fundamentals
Advanced C Training
Linux-C Debugging
System Programming
Network Programming
Linux Threads
Kernel Programming
Kernel Debugging
Linux Device Drivers

Best Reference Books

Computer Science Books
Algorithm & Programming Books
Electronics Engineering Books
Electrical Engineering Books
Chemical Engineering Books
Civil Engineering Books
Mechanical Engineering Books
Industrial Engineering Books
Instrumentation Engg Books
Metallurgical Engineering Books
All Stream Best Books

Questions and Answers

1000 C Questions & Answers
1000 C++ Questions & Answers
1000 C# Questions & Answers
1000 Java Questions & Answers
1000 Linux Questions & Answers
1000 Python Questions
1000 PHP Questions & Answers
1000 Hadoop Questions
Cloud Computing Questions
Computer Science Questions
All Stream Questions & Answers

India Internships

Computer Science Internships
Instrumentation Internships
Electronics Internships
Electrical Internships
Mechanical Internships
Industrial Internships
Systems Internships
Chemical Internships
Civil Internships
IT Internships
All Stream Internships

About Sanfoundry

About Us
Copyright
Terms
Privacy Policy
Jobs
Bangalore Training
Online Training
Developers Track
Mentoring Sessions
Contact Us
Sitemap
© 2011 Sanfoundry. All Rights Reserved.