Question: Take away assignment for the holiday 1. ______________ is the unauthorized movement of data. a) Data exfiltration b) Data infiltration c) Data cracking d) Database
Take away assignment for the holiday
1. ______________ is the unauthorized movement of data.
a) Data exfiltration
b) Data infiltration
c) Data cracking
d) Database hacking
2. Which of them is an example of physical data leakage?
a) Dumpster diving
b) MiTM
c) DDoS
d) Phishing
3. Which of them is not an example of data leakage done using electronic communication with malicious intent?
a) Phishing
b) Spoofed Email
c) Attacks using malware
d) Dumpster diving
4. The three steps of data loss prevention are - Identify, Discover and______________
a) Classify
b) Clarify
c) Deletion
d) Detection
5. Which of the following is not a step of data-loss prevention?
a) Identify
b) Manage
c) Classify
d) Discover
6. Mapping of data-flow in an organization is very useful in understanding the risk better due to actual & potential data leakage.
a) True
b) False
7. Data leakage prevention is based on factors like access controls, persistent, encryption, alerting, tokenization, blocking dynamic data masking, etc.
a) True
b) False
8. Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?
a) Data leak by 3rd Party apps
b) Data leak by partners
c) Data leak by employees
d) Data leak from stolen credentials from the desk
9. _____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.
a) Data loss prevention
b) Data loss measurement
c) Data stolen software
d) Data leak prevention
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
