Loading, please wait ...
Open its course - Database Systems

Security in Databases

  • Database Security
  • Threats
  • Countermeasures for Computer Based Controls
  • Authorization
  • Access Controls...
    View Complete Description
    ×

    Topic Summary

    • Database Security
    • Threats
    • Countermeasures for Computer Based Controls
    • Authorization
    • Access Controls
    • Views
    • Backup and Recovery
    • Integrity
    • Encryption
    • RAID (Redundant Array of Independent Disks)
Topic Questions:
36
MCQs T/F FiB SQ
14 6 10 6
Question Type Legends

Easy

Medium

Difficult
Open its course - Database Systems

Multiple Choice Questions for Security in Databases

  • ×

    Hidden Questions!

    Some MCQs are not visible. Usually teachers hides their visibility if they are few in number. Subject Expert recommends them to have more than 70+ questions against the topic and make them public.

  • 1 The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key is _____.
    1. Compression
    2. Encryption
    3. Both a & b
    4. None

  • 2 Which of the following provides a powerful and flexible security mechanism by hiding parts of the database from certain users?
    1. Views
    2. Functions
    3. Triggers
    4. Stored Procedures

  • 3 Which of the following is a Programmers or Operators level threat?
    1. Viewing and disclosing unauthorized data
    2. Staff Shortages or strikes
    3. Inadequate staff training
    4. None

  • 4 Which of the following is not a Database threat?
    1. Unauthorized amendment
    2. copying of data
    3. Theft of data
    4. Theft of Program

  • 5 Which of the following is a threat for hardware?
    1. Wire Tapping
    2. Fire/flood/bombs
    3. Data Corruption due to poer loss or surge
    4. Program Alteration

  • 6 _____ threats involve people and may be illegal action by both authorized users and unauthorized users, some of whom may be external to the organization.
    1. Un-Intentional
    2. Intentional
    3. Both a & b

  • 7 Any situation or event, whether intentional or accidental, that may adversely affect a system and consequently the organization is called
    1. Fraud
    2. Threat
    3. Privacy
    4. Availability

  • 8 Which of the following results in invalid or corrupted data, which may seriously affect the operation of an organization?
    1. Theft and fraud
    2. Loss of data integrity
    3. Loss of confidentiality
    4. Loss of privacy

  • 9 The need to protect data about individuals is?
    1. Privacy
    2. Confidentiality
    3. Authrization
    4. Authentication

  • 10 The mechanisms that protect the database against intentional or accidental threats is called
    1. Database Security
    2. Data Security
    3. Both a & b
    4. None

  • 11 In DBMS which security covers access and use of database objects (such as tables and views etc.) and the actions that users can have on the objects?
    1. Objects Security
    2. System Security
    3. Data Security
    4. Hardware Security

Contact Us

support@subexpert.com
Write to Us View Help
Subject Expert Logo

Subject Expert

Learn, Evaluate and Optimize

Follow Us
Facebook Switch Display Mode Enable Translation
© 2024 - Subject Expert