adplus-dvertising

Welcome to the Phases of Security MCQs Page

Dive deep into the fascinating world of Phases of Security with our comprehensive set of Multiple-Choice Questions (MCQs). This page is dedicated to exploring the fundamental concepts and intricacies of Phases of Security, a crucial aspect of Cyber Security. In this section, you will encounter a diverse range of MCQs that cover various aspects of Phases of Security, from the basic principles to advanced topics. Each question is thoughtfully crafted to challenge your knowledge and deepen your understanding of this critical subcategory within Cyber Security.

frame-decoration

Check out the MCQs below to embark on an enriching journey through Phases of Security. Test your knowledge, expand your horizons, and solidify your grasp on this vital area of Cyber Security.

Note: Each MCQ comes with multiple answer choices. Select the most appropriate option and test your understanding of Phases of Security. You can click on an option to test your knowledge before viewing the solution for a MCQ. Happy learning!

Phases of Security MCQs | Page 2 of 8

Q11.
Which of them is not an example of data leakage done using electronic communication with malicious intent?
Discuss
Answer: (d).Dumpster diving
Q12.
The three steps of data loss prevention are – Identify, Discover and______________
Discuss
Answer: (a).Classify
Q13.
Which of the following is not a step of data-loss prevention?
Discuss
Answer: (b).Manage
Q14.
Mapping of data-flow in an organization is very useful in understanding the risk better due to actual & potential data leakage.
Discuss
Answer: (a).True
Q15.
Data leakage prevention is based on factors like access controls, persistent, encryption, alerting, tokenization, blocking dynamic data masking, etc.
Discuss
Answer: (a).True
Q16.
Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?
Discuss
Answer: (a).Data leak by 3rd Party apps
Q17.
_____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.
Discuss
Answer: (a).Data loss prevention
Q18.
________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network.
Discuss
Answer: (c).Footprinting
Q19.
How many types of footprinting are there?

a.

5

b.

4

c.

3

d.

2

Discuss
Answer: (d).2
Q20.
________________ is one of the 3 pre-attacking phase.
Discuss
Answer: (c).Footprinting
Page 2 of 8

Suggested Topics

Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.

Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!