in Education by
Which of the following is not a step of data-loss prevention? (a) Identify (b) Manage (c) Classify (d) Discover I got this question in an interview for internship. I want to ask this question from Security Phases in division Phases of Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct choice is (b) Manage The best I can explain: The three steps of data loss prevention are – Identify, Discover and Classify. First, you have to identify the systems of records. Then you’ve to classify what comprises of sensitive data on those systems & discover the data elements which are sensitive depending on those classifications.

Related questions

0 votes
    The three steps of data loss prevention are - Identify, Discover and______________ (a) Classify (b) Clarify (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    _____________ focuses on the detection & prevention of sensitive data exfiltration and lost data. (a) Data loss prevention ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of these is not a step followed by cyber-criminals in data breaching? (a) Research and info-gathering (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of them is not a proper step in competitive intelligence data processing? (a) Data gathering (b) Data ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which one of the following is a proper step in competitive intelligence data processing? (a) Competitors' data ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    When a wireless user authenticates to any AP, both of them go in the course of four-step authentication ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Increase your security for social media account by always ____________ as you step away from the system. (a ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a vulnerability of the data-link layer? (a) MAC Address Spoofing (b) VLAN ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Data leakage threats do not usually occur from which of the following? (a) Web and email (b) Mobile data storage ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of the following is a private Search-engine and do not track our searching data? (a) Google (b) ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following data is not appropriate here, if you delete cache, cookies, and browser history? (a ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...