This is a computer science engineering quiz on cybersecurity, which includes questions on phrases of security which include malware, ransomware, etc.
_____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.
Data leakage threats do not usually occur from which of the following?
There are __________ major types of data leakage.
“Unauthorized” data leakage doesn’t essentially mean intended or malicious.
Unintentional data leakage can still result in the same penalties and reputational damage.
When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.
______________ is the unauthorized movement of data.
Which of them is an example of physical data leakage?
Which of them is not an example of data leakage done using electronic communication with malicious intent?
The three steps of data loss prevention are – Identify, Discover and______________
Which of the following is not a step of data-loss prevention?
Data leakage prevention is based on factors like access controls, persistent, encryption, alerting, tokenization, blocking dynamic data masking, etc.
Data leakage is popularly known as ___________
Data theft
Data crack
Low and slow data theft
Slow data theft
Which of them is not an example of physical data leakage?
Dumpster diving
Shoulder surfing
Printers and photocopiers
Phishing
Mapping of data flow in an organization is very useful in understanding the risk better due to actual and potential data leakage.
True
False