Security in Databases

  • Database Security
  • Threats
  • Countermeasures for Computer Based Controls
  • Authorization
  • Access Controls...
    View Complete Description
    ×

    Topic Summary

    • Database Security
    • Threats
    • Countermeasures for Computer Based Controls
    • Authorization
    • Access Controls
    • Views
    • Backup and Recovery
    • Integrity
    • Encryption
    • RAID (Redundant Array of Independent Disks)
36
Questions
Question Type Legends

Easy

Medium

Difficult

Multiple Choice Questions for Security in Databases

  • 1 The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key is _____.
    1. Compression
    2. Encryption
    3. Both a & b
    4. None

  • 2 ?Which of the following provides a powerful and flexible security mechanism by hiding parts of the database from certain users.
    1. Views
    2. Functions
    3. Triggers
    4. Stored Procedures

  • 3 Which of the following command gives privileges to user
    1. REVOKE
    2. GRANT
    3. Both a & b
    4. None

  • 4 Which of the following is a Programmers or Operators level threat?
    1. Viewing and disclosing unauthorized data
    2. Staff Shortages or strikes
    3. Inadequate staff training
    4. None

  • 5 Which of the following is not a Database threat?
    1. Unauthorized amendment
    2. copying of data
    3. Theft of data
    4. Theft of Program

  • 6 Which of the following is a threat for hardware?
    1. Wire Tapping
    2. Fire/flood/bombs
    3. Data Corruption due to poer loss or surge
    4. Program Alteration

  • 7 _____ threats involve people and may be illegal action by both authorized users and unauthorized users, some of whom may be external to the organization.
    1. Un-Intentional
    2. Intentional
    3. Both a & b

  • 8 Any situation or event, whether intentional or accidental, that may adversely affect a system and consequently the organization is called
    1. Fraud
    2. Threat
    3. Privacy
    4. Availability

  • 9 Which of the following results in invalid or corrupted data, which may seriously affect the operation of an organization?
    1. Theft and fraud
    2. Loss of data integrity
    3. Loss of confidentiality
    4. Loss of privacy

  • 10 The need to protect data about individuals is?
    1. Privacy
    2. Confidentiality
    3. Authrization
    4. Authentication

  • 11 The mechanisms that protect the database against intentional or accidental threats is called
    1. Database Security
    2. Data Security
    3. Both a & b
    4. None

  • 12 In DBMS which security covers access and use of database objects (such as tables and views etc.) and the actions that users can have on the objects?
    1. Objects Security
    2. System Security
    3. Data Security
    4. Hardware Security

Contact Us

support@subexpert.com
Write to Us View Help
Subject Expert Logo

Subject Expert

Learn and Evaluate

Follow Us
© 2020 - Subject Expert