Cyber Security Multiple Choice Questions on “Security Phases – Data Leakage and Prevention”.
1. _____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.
a) Database hacking
b) Data leakage
c) Data cracking
d) Data revealing
Answer: b
Clarification: Data leakage is the illicit transmission of data from inside an organization or personal system to an external location or recipient. The phrase is used for describing data that is transferred electronically or even physically.
2. Data leakage threats do not usually occur from which of the following?
a) Web and email
b) Mobile data storage
c) USB drives and laptops
d) Television
Answer: d
Clarification: Data leakage threats are common from web and emails, mobile data storage devices such as internal or external storage and memory cards, from USB drives and laptops.
3. Data leakage is popularly known as ___________
a) data theft
b) data crack
c) low and slow data theft
d) slow data theft
Answer: c
Clarification: Data leakage is also known as ‘low and slow data theft’, which is a massive issue for data security & the damage caused to any firm is enormous. Every day there is at least one report of data theft that occurs worldwide.
4. There are __________ major types of data leakage.
a) 2
b) 3
c) 4
d) 5
Answer: b
Clarification: There are three major types of data leakage. These are – data breach by accident, data leak done by ill-intentioned employees and electronic communication with malicious intent.
5. “Unauthorized” data leakage doesn’t essentially mean intended or malicious.
a) True
b) False
Answer: a
Clarification: “Unauthorized” data leakage doesn’t essentially mean intended or malicious. It has been found that the majority of data leakage incidents are accidental but the loss occurred are severe.
6. Unintentional data leakage can still result in the same penalties and reputational damage.
a) True
b) False
Answer: a
Clarification: “Unintentional” data leakage doesn’t essentially mean intended or malicious. It has been found that the majority of data leakage incidents are accidental but it can still result in the same penalties and reputational damage.
7. When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.
a) Ill-intentional data leakage
b) Malfunctioned in database
c) A malfunction in online data
d) ill-intension of an outsider
Answer: a
Clarification: When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called Ill-intentional data leakage done by employees of an organization.
8. Which of them is not an example of physical data leakage?
a) dumpster diving
b) shoulder surfing
c) printers and photocopiers
d) phishing
Answer: d
Clarification: Physical data leakage can be done intentionally by criminal-minded people who can fetch data from dumpster diving, shoulder surfing, data mentioned in printed papers or taken out of photocopiers.