Authentication and authorization mechanisms MCQs in DBMS
By: Prof. Dr. Fazal Rehman | Last updated: September 23, 2024
What is the primary purpose of authentication in a DBMS?
a) To encrypt data stored in the database
b) To verify the identity of users trying to access the database
c) To manage and assign roles to users
d) To track and record user activitiesAnswer: b) To verify the identity of users trying to access the database
Which authentication mechanism uses a combination of something the user knows (password) and something the user has (token or smart card)?
a) Single-factor authentication
b) Two-factor authentication
c) Multi-factor authentication
d) Biometric authenticationAnswer: b) Two-factor authentication
In the context of database security, what is an authorization mechanism used for?
a) To verify user identity
b) To grant or restrict access to database resources based on user roles and permissions
c) To encrypt data in transit
d) To track database performanceAnswer: b) To grant or restrict access to database resources based on user roles and permissions
Which of the following is an example of an access control list (ACL) in a DBMS?
a) A list of users and their associated passwords
b) A list of permissions and roles assigned to each user
c) A list of database tables and their indexes
d) A list of encrypted data keysAnswer: b) A list of permissions and roles assigned to each user
What does Role-Based Access Control (RBAC) primarily manage?
a) Data encryption standards
b) User authentication mechanisms
c) Permissions based on user roles
d) Database query performanceAnswer: c) Permissions based on user roles
Which mechanism ensures that only authorized users can perform specific operations on a database object?
a) Authentication
b) Authorization
c) Encryption
d) Backup and recoveryAnswer: b) Authorization
What is the purpose of a “privilege” in a database system?
a) To define a user’s identity
b) To specify a user’s permissions for accessing or modifying data
c) To encrypt sensitive data
d) To maintain database schemaAnswer: b) To specify a user’s permissions for accessing or modifying data
Which type of access control allows users to manage their own permissions for accessing database resources?
a) Mandatory Access Control (MAC)
b) Discretionary Access Control (DAC)
c) Role-Based Access Control (RBAC)
d) Attribute-Based Access Control (ABAC)Answer: b) Discretionary Access Control (DAC)
What is the main advantage of using Multi-Factor Authentication (MFA) over Single-Factor Authentication (SFA)?
a) MFA simplifies the authentication process
b) MFA improves security by requiring multiple forms of verification
c) MFA reduces the number of passwords required
d) MFA ensures faster database accessAnswer: b) MFA improves security by requiring multiple forms of verification
Which access control model enforces access restrictions based on user roles and their associated permissions?
a) Mandatory Access Control (MAC)
b) Role-Based Access Control (RBAC)
c) Discretionary Access Control (DAC)
d) Attribute-Based Access Control (ABAC)Answer: b) Role-Based Access Control (RBAC)
In which authentication method is the user’s fingerprint or retina scan used for verification?
a) Single-factor authentication
b) Two-factor authentication
c) Multi-factor authentication
d) Biometric authenticationAnswer: d) Biometric authentication
Which of the following is NOT typically a part of an authorization mechanism in a DBMS?
a) Access control lists (ACLs)
b) Role assignments
c) User passwords
d) Privilege grantsAnswer: c) User passwords
What is the main function of an audit trail in the context of database security?
a) To prevent unauthorized access
b) To track and log user activities and changes to data
c) To manage user roles and permissions
d) To encrypt data for secure storageAnswer: b) To track and log user activities and changes to data
In which scenario would a database system use mandatory access control (MAC)?
a) When users need to manage their own permissions
b) When strict access controls are enforced based on security labels
c) When permissions are assigned dynamically based on user roles
d) When access control decisions are based on user attributesAnswer: b) When strict access controls are enforced based on security labels
Which type of access control is most appropriate for a system requiring strict and predefined access levels for all users?
a) Discretionary Access Control (DAC)
b) Role-Based Access Control (RBAC)
c) Mandatory Access Control (MAC)
d) Attribute-Based Access Control (ABAC)Answer: c) Mandatory Access Control (MAC)