Phases of Security MCQ part-2

In this MCQ, we will explore the different phases of security. We will discuss the importance of each phase and how they work together to create a secure environment. We will also explore the different types of security threats and how to mitigate them.

Que.Which of them is not an example of data leakage done using electronic communication with malicious intent?
a. Phishing
b. Spoofed Email
c. Attacks using malware
d. Dumpster diving
Que.The three steps of data loss prevention are – Identify, Discover and______________
a. Classify
b. Clarify
c. Deletion
d. Detection
Que.Which of the following is not a step of data-loss prevention?
a. Identify
b. Manage
c. Classify
d. Discover
Que.Mapping of data-flow in an organization is very useful in understanding the risk better due to actual & potential data leakage.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Data leakage prevention is based on factors like access controls, persistent, encryption, alerting, tokenization, blocking dynamic data masking, etc.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?
a. Data leak by 3rd Party apps
b. Data leak by partners
c. Data leak by employees
d. Data leak from stolen credentials from the desk
Que._____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.
a. Data loss prevention
b. Data loss measurement
c. Data stolen software
d. Data leak prevention
Que.________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network.
a. Fingerprinting
b. 3D printing
c. Footprinting
d. Data printing
Que.How many types of footprinting are there?
a. 5
b. 4
c. 3
d. 2
Que.________________ is one of the 3 pre-attacking phase.
a. Fingerprinting
b. 3D printing
c. Footprinting
d. Data printing

Get code60