Question
a.
Ill-intentional data leakage
b.
Malfunctioned in database
c.
A malfunction in online data
d.
ill-intension of an outsider
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.
Similar Questions
Discover Related MCQs
Q. Which of them is not an example of physical data leakage?
View solution
Q. ______________ is the unauthorized movement of data.
View solution
Q. Which of them is an example of physical data leakage?
View solution
Q. Which of them is not an example of data leakage done using electronic communication with malicious intent?
View solution
Q. The three steps of data loss prevention are – Identify, Discover and______________
View solution
Q. Which of the following is not a step of data-loss prevention?
View solution
Q. Mapping of data-flow in an organization is very useful in understanding the risk better due to actual & potential data leakage.
View solution
Q. Data leakage prevention is based on factors like access controls, persistent, encryption, alerting, tokenization, blocking dynamic data masking, etc.
View solution
Q. Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?
View solution
Q. _____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.
View solution
Q. ________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network.
View solution
Q. How many types of footprinting are there?
View solution
Q. ________________ is one of the 3 pre-attacking phase.
View solution
Q. A/An ______________ spends 85% of his/her time in profiling an organization and rest amount in launching the attack.
View solution
Q. _______________ is necessary to methodically & systematically ensure all pieces of information related to target.
View solution
Q. Which of the following is not a spot from where attackers seek information?
View solution
Q. Which of them is not an information source over the internet for target attackers?
View solution
Q. Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details.
View solution
Q. Spywares can be used to steal _______________ from the attacker’s browser.
View solution
Q. https://archive.org is a popular site where one can enter a domain name in its search box for finding out how the site was looking at a given date.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!