By: Prof. Dr. Fazal Rehman | Last updated: September 23, 2024
Which of the following is a primary goal of database security?
a) Increase transaction speed
b) Ensure data consistency
c) Protect data from unauthorized access and breaches
d) Optimize query performanceAnswer: c) Protect data from unauthorized access and breaches
What is the purpose of authentication in database security?
a) To verify the identity of users accessing the database
b) To encrypt data stored in the database
c) To ensure data integrity during transmission
d) To manage user roles and permissionsAnswer: a) To verify the identity of users accessing the database
Which type of access control involves assigning permissions based on roles rather than individual users?
a) Discretionary Access Control (DAC)
b) Mandatory Access Control (MAC)
c) Role-Based Access Control (RBAC)
d) Attribute-Based Access Control (ABAC)Answer: c) Role-Based Access Control (RBAC)
What is the main function of a database management system (DBMS) in terms of data security?
a) To manage data storage efficiently
b) To ensure the availability of data
c) To enforce access control and manage user permissions
d) To optimize data retrieval speedAnswer: c) To enforce access control and manage user permissions
Which of the following is NOT typically considered a database security measure?
a) Encryption
b) Access control lists
c) Backup and recovery
d) Query optimizationAnswer: d) Query optimization
In the context of database security, what is a “privilege”?
a) The right to perform specific operations on the database
b) The ability to access the database from multiple devices
c) The permission to modify database schema
d) The capacity to store large volumes of dataAnswer: a) The right to perform specific operations on the database
Which access control model enforces restrictions based on predefined security labels and classification levels?
a) Discretionary Access Control (DAC)
b) Mandatory Access Control (MAC)
c) Role-Based Access Control (RBAC)
d) Attribute-Based Access Control (ABAC)Answer: b) Mandatory Access Control (MAC)
What is the principle of least privilege in database security?
a) Users should have the maximum level of access required to perform their job functions
b) Users should be given minimal access rights necessary to perform their tasks
c) Users should be granted access to all available data for flexibility
d) Access rights should be granted based on user role rather than necessityAnswer: b) Users should be given minimal access rights necessary to perform their tasks
What is the role of auditing in database security?
a) To provide real-time monitoring of database performance
b) To track and record database access and modifications for security purposes
c) To encrypt data during storage
d) To manage user roles and permissionsAnswer: b) To track and record database access and modifications for security purposes
Which of the following techniques helps to protect data from unauthorized access during transmission?
a) Data encryption
b) Backup and recovery
c) Role-based access control
d) Data normalizationAnswer: a) Data encryption
In a database context, what does “data masking” refer to?
a) Hiding data to prevent unauthorized users from accessing sensitive information
b) Encrypting data to ensure its confidentiality
c) Backing up data to prevent loss
d) Modifying data to improve performanceAnswer: a) Hiding data to prevent unauthorized users from accessing sensitive information
Which method of database access control allows users to specify which resources they want to share and with whom?
a) Mandatory Access Control (MAC)
b) Discretionary Access Control (DAC)
c) Role-Based Access Control (RBAC)
d) Attribute-Based Access Control (ABAC)Answer: b) Discretionary Access Control (DAC)
What is a “firewall” in the context of database security?
a) A software tool that prevents unauthorized access to or from a private network
b) A hardware device used to improve database performance
c) A method for encrypting data during storage
d) A protocol for managing database backupsAnswer: a) A software tool that prevents unauthorized access to or from a private network
What does “data integrity” ensure in a database system?
a) That data is stored efficiently
b) That data is accurate, consistent, and reliable
c) That data can be retrieved quickly
d) That data is accessible to all usersAnswer: b) That data is accurate, consistent, and reliable
Which database security practice involves regularly reviewing and updating user access permissions?
a) Security patch management
b) Privilege auditing
c) Data encryption
d) Backup and recoveryAnswer: b) Privilege auditing