DATABASE SECURITY 14 Jul,2023 boomtecho2@gmail.comLeave a comment Please enter your email: 1. What is used for database security ? Data Encryption ` a view Finger print All of the Above 2. Data security threats include : privacy invasion hardware protection fraudulent manipulation od data All of the above 3. Database security management: includes the techniques used to manage database user access is the processes and procedures used to detect security breaches is the collection of processes and procedures used to protect data and database systems details the corporate responsibility of management to secure data 4. _____ limits who gains access to the database while _____ limits what a user can access within the database. Access authentication, user definition Access authentication, view definition Data access, user monitoring Access control, database security 5. _____ is the process of transforming data into an unreadable form to anyone who does not know the key. Data authentication Data security Data encryption Database security management 6. Which of the following does a database security solution not monitor? Database changes Sensitive data access Database complexity Security events 7. Prevention of access to the database by unauthorized users is referred to as : Integrity Productivity Security Reliability 8. Authentication refers to : methods of restricting user access to system controlling access to portions of database controlling the operation on the data all of the above 9. Data integrity means : providing first access to stored data ensuring correctness and consistency of data providing data sharing none of the above 10. What’s the full form of CLR? Common Language Runtime Computing language Runtime Conditional language Runtime None of the above 11. What is Authentication ? used to authenticate someone’s identity is a way to provide permission to someone to access a particular resource is the way of controlling to access none of the above 12. what is Authorization is security system? used to check the identity of authorized person is a way to provide permission to someone to access a particular resource Authorization determines what resources a user can access. Both B and C 13. What is Database Security ? to establish and preserve database confidentiality, integrity, and availability is a complex and challenging endeavor that involves all aspects of information security technologies and practices is a technique for protecting and securing a database from intentional or accidental threats All of the Above 14. Why Database Security is Important? must be protected from abuse and illegal access and updates. Its prevent the unauthorized database access Both A and B None of the Above 15. Common threats and Challenges in Security system. Human Error Insider Dangers Malware All of the above 16. Select the wrong following Data protection tool Monitoring of Data Activity: Discovery Optimization of Data Security and Risk Analysis provide the accessibility to unauthorized user Loading …