Phases of Security: Essential Cyber-Security Phrases

This is a computer science engineering quiz on cybersecurity, which includes questions on phrases of security which include malware, ransomware, etc.

download.jpg
Start Quiz

_____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.

Database hacking Data leakage Data cracking Data revealing

Data leakage threats do not usually occur from which of the following?

Web and email Mobile data storage USB drives and laptops Television

There are __________ major types of data leakage.

2 3 4 5

“Unauthorized” data leakage doesn’t essentially mean intended or malicious.

True False

Unintentional data leakage can still result in the same penalties and reputational damage.

True False

When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.

Ill-intentional data leakage Malfunctioned in database A malfunction in online data ill-intension of an outsider

______________ is the unauthorized movement of data.

Data exfiltration Data infiltration Data cracking Database hacking

Which of them is an example of physical data leakage?

Dumpster diving MiTM DDoS Phishing

Which of them is not an example of data leakage done using electronic communication with malicious intent?

Phishing Spoofed Email Attacks using malware Dumpster diving

The three steps of data loss prevention are – Identify, Discover and______________

Classify Clarify Deletion Detection

Which of the following is not a step of data-loss prevention?

Identify Manage Classify Discover

Data leakage prevention is based on factors like access controls, persistent, encryption, alerting, tokenization, blocking dynamic data masking, etc.

True False

Data leakage is popularly known as ___________

Data theft

Data crack

Low and slow data theft

Slow data theft

Which of them is not an example of physical data leakage?

Dumpster diving

Shoulder surfing

Printers and photocopiers

Phishing

Mapping of data flow in an organization is very useful in understanding the risk better due to actual and potential data leakage.

True

False

Quiz/Test Summary
Title: Phases of Security: Essential Cyber-Security Phrases
Questions: 15
Contributed by:
james