adplus-dvertising
frame-decoration

Question

Which of these is not a proper method of maintaining confidentiality?

a.

Biometric verification

b.

ID and password based verification

c.

2-factor authentication

d.

switching off the phone

Answer: (d).switching off the phone

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of these is not a proper method of maintaining confidentiality?

Similar Questions

Discover Related MCQs

Q. Data integrity gets compromised when _____ and _____ are taken control off.

Q. ______ is the latest technology that faces an extra challenge because of CIA paradigm.

Q. One common way to maintain data availability is __________

Q. _______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Q. From the options below, which of them is not a threat to information security?

Q. From the options below, which of them is not a vulnerability to information security?

Q. _____ platforms are used for safety and protection of information in the cloud.

Q. Which of the following information security technology is used for avoiding browser-based hacking?

Q. The full form of EDR is _______

Q. _______ technology is used for analyzing and monitoring traffic in network and information flow.

Q. Compromising confidential information comes under _________

Q. Lack of access control policy is a _____________

Q. Possible threat to any information cannot be ________________

Q. How many basic processes or steps are there in ethical hacking?

Q. ____________ is the information gathering phase in ethical hacking from the target user.

Q. Which of the following is not a reconnaissance tool or technique for information gathering?

Q. There are ______ subtypes of reconnaissance.

Q. Which of the following is an example of active reconnaissance?

Q. Which of the following is an example of passive reconnaissance?

Q. ________ phase in ethical hacking is known as the pre-attack phase.