Question: Take away assignment for the holiday 1. ______________ is the unauthorized movement of data. a) Data exfiltration b) Data infiltration c) Data cracking d) Database

Take away assignment for the holiday

1. ______________ is the unauthorized movement of data.

a) Data exfiltration

b) Data infiltration

c) Data cracking

d) Database hacking

2. Which of them is an example of physical data leakage?

a) Dumpster diving

b) MiTM

c) DDoS

d) Phishing

3. Which of them is not an example of data leakage done using electronic communication with malicious intent?

a) Phishing

b) Spoofed Email

c) Attacks using malware

d) Dumpster diving

4. The three steps of data loss prevention are - Identify, Discover and______________

a) Classify

b) Clarify

c) Deletion

d) Detection

5. Which of the following is not a step of data-loss prevention?

a) Identify

b) Manage

c) Classify

d) Discover

6. Mapping of data-flow in an organization is very useful in understanding the risk better due to actual & potential data leakage.

a) True

b) False

7. Data leakage prevention is based on factors like access controls, persistent, encryption, alerting, tokenization, blocking dynamic data masking, etc.

a) True

b) False

8. Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?

a) Data leak by 3rd Party apps

b) Data leak by partners

c) Data leak by employees

d) Data leak from stolen credentials from the desk

9. _____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.

a) Data loss prevention

b) Data loss measurement

c) Data stolen software

d) Data leak prevention

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Marketing Questions!