in Education by
Which of them is not an example of physical data leakage? (a) dumpster diving (b) shoulder surfing (c) printers and photocopiers (d) phishing I have been asked this question in examination. The origin of the question is Security Phases topic in division Phases of Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct option is (d) phishing Easy explanation: Physical data leakage can be done intentionally by criminal-minded people who can fetch data from dumpster diving, shoulder surfing, data mentioned in printed papers or taken out of photocopiers.

Related questions

0 votes
    Which of them is an example of physical data leakage? (a) Dumpster diving (b) MiTM (c) DDoS (d) Phishing ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of them is not an example of data leakage done using electronic communication with malicious intent? (a) Phishing ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
0 votes
    Which of them is not an example of physical hacking? (a) Walk-in using piggybacking (b) Sneak-in (c) Break- ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of this is an example of physical hacking? (a) Remote Unauthorised access (b) Inserting malware loaded USB ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Route spoofing ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
0 votes
    Which of them is not an example of business email security tool? (a) Microsoft Office Trust Center (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of them is not an example of business email security tool? (a) Enlocked (b) RPost Office (c) MS ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Data leakage threats do not usually occur from which of the following? (a) Web and email (b) Mobile data storage ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of them is an example of grabbing email information? (a) Cookie stealing (b) Reverse engineering (c) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Section 79 of the Indian IT Act declares that any 3^rd party information or personal data leakage in corporate firms ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...