Data Security MCQ Questions

This section focuses on "Data Security" in Cyber Security. These Multiple Choice Questions (MCQ) should be practiced to improve the Cyber Security skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.

1. What is true about data security?

A. Data security is the protection of programs and data in computers and communication systems against unauthorized access
B. It refers to the right of individuals or organizations to deny or restrict the collection and use of information
C. Data security requires system managers to reduce unauthorized access to the systems by building physical arrangements and software checks.
D. All of the above

View Answer


2. Which of the following are data security consideration?

A. Backups
B. Archival Storage
C. Disposal of Data
D. All of the above

View Answer


3. Which of the following is most used rule for backup?

A. 4-2-1 Rule
B. 3-2-1 Rule
C. 4-3-2 Rule
D. 4-3-1 Rule

View Answer


4. In 3-2-1 rule 2 represents?

A. copies of our data
B. different formats
C. off-site backup
D. None of the above

View Answer


5. ________ is the process of retaining or keeping of data at a secure place for long-term storage.

A. Data archiving
B. Archival Storage
C. Disposal of Data
D. Backup

View Answer


6. Which of the following is not a form of data archiving?

A. Online
B. Offline
C. Storage arrchiving
D. Cloud-storage

View Answer


7. What is Selective archiving?

A. the storage mechanisms we use for archiving data would change over time
B. we will archive only a selective part of data because not all data is equally important.
C. In the real world is archived data which is in an obsolete format.
D. All of the above

View Answer


8. Which of the following is an example of archives online?

A. On removable media
B. document files
C. dedicated archive server
D. DVD drives

View Answer


9. Which of the following will not help us for the secure disposal of data?

A. Destroy the data
B. Destroy the device
C. Keep careful records
D. Destroy access

View Answer


10. What is Eliminate potential clues?

A. we have to clear the configuration settings from networking equipment.
B. it can provide crucial clues to a security cracker to break into our network and the systems that reside on it.
C. Both A and B
D. None of the above

View Answer





Discussion



* You must be logged in to add comment.