in Education by
Which of these is not a proper method of maintaining confidentiality? (a) Biometric verification (b) ID and password based verification (c) 2-factor authentication (d) switching off the phone This question was addressed to me in exam. This key question is from Elements of Security topic in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct option is (d) switching off the phone The explanation: Switching off the phone in the fear of preserving the confidentiality of data is not a proper solution for data confidentiality. Fingerprint detection, face recognition, password-based authentication, two-step verifications are some of these.

Related questions

0 votes
    Which of them is not a proper method for email security? (a) Use Strong password (b) Use email ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental? (a) They help ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
0 votes
    Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)? ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a proper aspect of user integration? (a) Employee's authentication (b) Physical ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of them is not a proper step in competitive intelligence data processing? (a) Data gathering (b) Data ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of them is not a proper way of getting into the system? (a) IM (b) Attachments (c) Official ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a proper use of RE for ethical hackers? (a) Check for poorly designed ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a proper way of how spammers get the email Ids? (a) When a user ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Data ___________ is used to ensure confidentiality. (a) Encryption (b) Locking (c) Deleting (d) Backup This ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    It is necessary to use ________________ for maintaining searched data privacy. (a) Private email services (b) ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which one of the following is a proper step in competitive intelligence data processing? (a) Competitors' data ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of them is a proper measure of securing social networking account? (a) Never keep your password with ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of them is not an appropriate method of router security? (a) Unused ports should be blocked (b) Unused ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...