In this MCQ, we will explore the different phases of security. We will discuss the importance of each phase and how they work together to create a secure environment. We will also explore the different types of security threats and how to mitigate them.
Que.Which of them is not an example of data leakage done using electronic communication with malicious intent?
Que.Data leakage prevention is based on factors like access controls, persistent, encryption, alerting, tokenization, blocking dynamic data masking, etc.