in Education by
One common way to maintain data availability is __________ (a) Data clustering (b) Data backup (c) Data recovery (d) Data Altering I have been asked this question in a national level competition. This intriguing question comes from Elements of Security topic in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right option is (b) Data backup Explanation: For preventing data from data-loss, or damage data backup can be done and stored in a different geographical location so that it can sustain its data from natural disasters & unpredictable events.

Related questions

0 votes
    _________ are those individuals who maintain and handles IT security in any firm or organization. (a) IT Security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental? (a) They help ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    One advantage of Packet Filtering firewall is __________ (a) more efficient (b) less complex (c) less costly (d) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    One advantage of Stateful Multilayer Inspection firewall is __________ (a) costlier but easy to understand (b) large to ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    __________ is used for encrypting data at network level. (a) IPSec (b) HTTPS (c) SMTP (d) S/MIME This ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    The legal risks of ethical hacking include lawsuits due to __________ of personal data. (a) stealing (b) disclosure ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    There are __________ major types of data leakage. (a) 2 (b) 3 (c) 4 (d) 5 I got this question in a ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Applications developed by programming languages like ____ and ______ have this common buffer-overflow error. (a) C, Ruby ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability. (a) Windows 7 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Among the two types ____________buffer-overflow is complex to execute and the least common attack that may take place. (a ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...