cyber security and element set 8

Que.Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.
a. network security
b. physical security
c. database security
d. wireless security
Que.________ is the ability of an individual to gain physical access to an authorized area.
a. Network accessing
b. Database accessing
c. Remote accessing
d. Physical accessing
Que.Which of the following is not considering the adequate measure for physical security?
a. Lock the drawers
b. Keep strong passwords for corporate laptops and mobile phones
c. Keep confidential organization’s document file open in the desk
d. Hide your hand against camera while inserting the PIN code
Que.Which of the following is not a physical security measure to protect against physical hacking?
a. Add front desk & restrict unknown access to the back room
b. Create a phishing policy
c. Analyze how employees maintain their physical data and data storage peripheral devices
d. Updating the patches in the software you’re working at your office laptop.
Que.IT security department must periodically check for security logs and entries made during office hours.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of them is not an example of physical hacking?
a. Walk-in using piggybacking
b. Sneak-in
c. Break-in and steal
d. Phishing
Que.Physical _________ is important to check & test for possible physical breaches.
a. penetration test
b. security check
c. hacking
d. access
Que.___________ ensures the integrity and security of data that are passing over a network.
a. Firewall
b. Antivirus
c. Pentesting Tools
d. Network-security protocols
Que.Which of the following is not a strong security protocol?
a. HTTPS
b. SSL
c. SMTP
d. SFTP
Que.Which of the following is not a secured mail transferring methodology?
a. POP3
b. SSMTP
c. Mail using PGP
d. S/MIME

Get code60