Data Security MCQ Questions
This section focuses on "Data Security" in Cyber Security. These Multiple Choice Questions (MCQ) should be practiced to improve the Cyber Security skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.
1. What is true about data security?
A. Data security is the protection of programs and data in computers and communication systems against unauthorized access
B. It refers to the right of individuals or organizations to deny or restrict the collection and use of information
C. Data security requires system managers to reduce unauthorized access to the systems by building physical arrangements and software checks.
D. All of the above
View Answer
Ans : D
Explanation: All of the above statement are true.
2. Which of the following are data security consideration?
A. Backups
B. Archival Storage
C. Disposal of Data
D. All of the above
View Answer
Ans : D
Explanation: All of the above are data security consideration.
3. Which of the following is most used rule for backup?
A. 4-2-1 Rule
B. 3-2-1 Rule
C. 4-3-2 Rule
D. 4-3-1 Rule
View Answer
Ans : B
Explanation: To use the Backup 3-2-1 Rule is very popular.
4. In 3-2-1 rule 2 represents?
A. copies of our data
B. different formats
C. off-site backup
D. None of the above
View Answer
Ans : B
Explanation: Two different formats, i.e., hard drive+tape backup or DVD (short term)+flash drive
5. ________ is the process of retaining or keeping of data at a secure place for long-term storage.
A. Data archiving
B. Archival Storage
C. Disposal of Data
D. Backup
View Answer
Ans : A
Explanation: Data archiving is the process of retaining or keeping of data at a secure place for long-term storage.
6. Which of the following is not a form of data archiving?
A. Online
B. Offline
C. Storage arrchiving
D. Cloud-storage
View Answer
Ans : C
Explanation: Storage arrchiving is not a form of data archiving.
7. What is Selective archiving?
A. the storage mechanisms we use for archiving data would change over time
B. we will archive only a selective part of data because not all data is equally important.
C. In the real world is archived data which is in an obsolete format.
D. All of the above
View Answer
Ans : B
Explanation: In this consideration, we have to sure about what should be archived. That means we will archive only a selective part of data because not all data is equally important.
8. Which of the following is an example of archives online?
A. On removable media
B. document files
C. dedicated archive server
D. DVD drives
View Answer
Ans : C
Explanation: we have to decide whether to store our archives online (Example : on a dedicated archive server).
9. Which of the following will not help us for the secure disposal of data?
A. Destroy the data
B. Destroy the device
C. Keep careful records
D. Destroy access
View Answer
Ans : D
Explanation: Eliminate access will help us for the secure disposal of data.
10. What is Eliminate potential clues?
A. we have to clear the configuration settings from networking equipment.
B. it can provide crucial clues to a security cracker to break into our network and the systems that reside on it.
C. Both A and B
D. None of the above
View Answer
Ans : C
Explanation: Eliminate potential clues : we have to clear the configuration settings from networking equipment. We do this because it can provide crucial clues to a security cracker to break into our network and the systems that reside on it.
Discussion