What is database authentication?
A) Securing network connections to the database
B) Verifying the identity of users accessing the database
C) Encrypting data stored in the database
D) Controlling access to specific database objects
Answer: B
Which authentication method requires users to provide both a username and password?
A) Single sign-on (SSO)
B) Two-factor authentication (2FA)
C) Role-based authentication
D) Username-password authentication
Answer: D
What is the purpose of database authorization?
A) Encrypting data stored in the database
B) Controlling access to specific database objects
C) Authenticating users accessing the database
D) Securing network connections to the database
Answer: B
Which authorization model uses roles to manage user access permissions?
A) Access control lists (ACLs)
B) Mandatory access control (MAC)
C) Role-based access control (RBAC)
D) Discretionary access control (DAC)
Answer: C
What is mandatory access control (MAC) in database security?
A) Users control access permissions
B) Data owners control access permissions
C) Access permissions are assigned based on roles
D) Access permissions are determined by the system administrator
Answer: D
Which encryption technique ensures that the same plaintext encrypts to the same ciphertext each time it is encrypted?
A) Symmetric encryption
B) Asymmetric encryption
C) Hashing
D) Steganography
Answer: A
Which encryption technique uses a single key for both encryption and decryption?
A) Symmetric encryption
B) Asymmetric encryption
C) Hashing
D) Public key encryption
Answer: A
Which encryption technique uses different keys for encryption and decryption?
A) Symmetric encryption
B) Asymmetric encryption
C) Hashing
D) Digital signatures
Answer: B
What is hashing in the context of database security?
A) Encrypting data using a public key
B) Generating a fixed-size string from input data
C) Securing network connections to the database
D) Controlling access to specific database objects
Answer: B
Which of the following is true about hashing?
A) It uses a key pair for encryption and decryption
B) It is reversible, allowing data retrieval from hashed values
C) It ensures that the same plaintext encrypts to the same ciphertext each time
D) It is commonly used for data encryption in transit
Answer: B
What is the purpose of database encryption?
A) Authenticating users accessing the database
B) Controlling access to specific database objects
C) Securing data stored in the database
D) Securing network connections to the database
Answer: C
Which encryption method is commonly used to secure data transmission between a client and a database server?
A) Public key encryption
B) Symmetric encryption
C) Asymmetric encryption
D) Digital signatures
Answer: B
What is the role of digital signatures in database security?
A) Encrypting data using a private key
B) Verifying the integrity and authenticity of data
C) Generating a fixed-size string from input data
D) Controlling access to specific database objects
Answer: B
Which of the following is a benefit of using database encryption?
A) Simplifying access control management
B) Ensuring data integrity
C) Reducing network latency
D) Securing sensitive data from unauthorized access
Answer: D
What is SQL injection?
A) A technique used to bypass database authentication
B) A technique used to manipulate database queries
C) A technique used to decrypt hashed passwords
D) A technique used to encrypt database backups
Answer: B
Which of the following is a mitigation technique against SQL injection attacks?
A) Using HTTPS for database connections
B) Using parameterized queries
C) Using symmetric encryption
D) Using public key infrastructure (PKI)
Answer: B
Which database security feature helps prevent unauthorized access by enforcing access permissions?
A) Role-based access control (RBAC)
B) Encryption
C) Authentication
D) Authorization
Answer: A
What is the purpose of access control lists (ACLs) in database security?
A) To manage encryption keys
B) To enforce role-based access control
C) To manage user permissions at a granular level
D) To authenticate users accessing the database
Answer: C
Which of the following is an example of a strong password policy?
A) Requiring passwords to be at least 6 characters long
B) Requiring passwords to include uppercase letters
C) Requiring passwords to be stored in plaintext
D) Requiring passwords to be changed every 6 months
Answer: B
What is the purpose of multi-factor authentication (MFA) in database security?
A) To encrypt database backups
B) To authenticate users using multiple methods
C) To store passwords securely
D) To manage encryption keys
Answer: B
Which of the following is a common method of implementing multi-factor authentication (MFA)?
A) Using a username and password only
B) Using a security token and a biometric scan
C) Using a public key and a private key
D) Using a single sign-on (SSO) mechanism
Answer: B
What is the purpose of data masking in database security?
A) To enforce role-based access control
B) To hide sensitive data from unauthorized users
C) To encrypt data during transmission
D) To manage encryption keys
Answer: B
Which of the following is an example of data masking?
A) Encrypting credit card numbers stored in a database
B) Replacing sensitive data with realistic but fictional data
C) Using HTTPS for database connections
D) Using a strong password policy
Answer: B
What is the purpose of database auditing in database security?
A) To encrypt database backups
B) To monitor and record database activities
C) To enforce role-based access control
D) To manage encryption keys
Answer: B
Which of the following is a benefit of database auditing?
A) Simplifying access control management
B) Ensuring data integrity
C) Monitoring and detecting unauthorized access
D) Securing data during transmission
Answer: C
What is the purpose of database hardening in database security?
A) To encrypt database backups
B) To secure the database environment by reducing vulnerabilities
C) To manage encryption keys
D) To enforce role-based access control
Answer: B
Which of the following is an example of database hardening?
A) Implementing firewall rules to restrict database access
B) Using a strong password policy
C) Encrypting sensitive data stored in a database
D) Using multi-factor authentication (MFA)
Answer: A
What is the purpose of database masking in database security?
A) To encrypt database backups
B) To hide sensitive data from unauthorized users
C) To enforce role-based access control
D) To manage encryption keys
Answer: B
Which of the following is an example of database masking?
A) Encrypting credit card numbers stored in a database
B) Replacing sensitive data with realistic but fictional data
C) Using HTTPS for database connections
D) Using a strong password policy
Answer: B
What is the purpose of database auditing in database security?
A) To encrypt database backups
B) To monitor and record database activities
C) To enforce role-based access control
D) To manage encryption keys
Answer: B
Which of the following is a benefit of database auditing?
A) Simplifying access control management
B) Ensuring data integrity
C) Monitoring and detecting unauthorized access
D) Securing data during transmission
Answer: C
What is the purpose of database hardening in database security?
A) To encrypt database backups
B) To secure the database environment by reducing vulnerabilities
C) To manage encryption keys
D) To enforce role-based access control
Answer: B
Which of the following is an example of database hardening?
A) Implementing firewall rules to restrict database access
B) Using a strong password policy
C) Encrypting sensitive data stored in a database
D) Using multi-factor authentication (MFA)
Answer: A
What is the purpose of database masking in database security?
A) To encrypt database backups
B) To hide sensitive data from unauthorized users
C) To enforce role-based access control
D) To manage encryption keys
Answer: B
Which of the following is an example of database masking?
A) Encrypting credit card numbers stored in a database
B) Replacing sensitive data with realistic but fictional data
C) Using HTTPS for database connections
D) Using a strong password policy
Answer: B
What is the purpose of database auditing in database security?
A) To encrypt database backups
B) To monitor and record database activities
C) To enforce role-based access control
D) To manage encryption keys
Answer: B
Which of the following is a benefit of database auditing?
A) Simplifying access control management
B) Ensuring data integrity
C) Monitoring and detecting unauthorized access
D) Securing data during transmission
Answer: C
What is the purpose of database hardening in database security?
A) To encrypt database backups
B) To secure the database environment by reducing vulnerabilities
C) To manage encryption keys
D) To enforce role-based access control
Answer: B
Which of the following is an example of database hardening?
A) Implementing firewall rules to restrict database access
B) Using a strong password policy
C) Encrypting sensitive data stored in a database
D) Using multi-factor authentication (MFA)
Answer: A
What is the purpose of database masking in database security?
A) To encrypt database backups
B) To hide sensitive data from unauthorized users
C) To enforce role-based access control
D) To manage encryption keys
Answer: B
Which of the following is an example of database masking?
A) Encrypting credit card numbers stored in a database
B) Replacing sensitive data with realistic but fictional data
C) Using HTTPS for database connections
D) Using a strong password policy
Answer: B
What is the purpose of database auditing in database security?
A) To encrypt database backups
B) To monitor and record database activities
C) To enforce role-based access control
D) To manage encryption keys
Answer: B
Which of the following is a benefit of database auditing?
A) Simplifying access control management
B) Ensuring data integrity
C) Monitoring and detecting unauthorized access
D) Securing data during transmission
Answer: C
What is the purpose of database hardening in database security?
A) To encrypt database backups
B) To secure the database environment by reducing vulnerabilities
C) To manage encryption keys
D) To enforce role-based access control
Answer: B
Which of the following is an example of database hardening?
A) Implementing firewall rules to restrict database access
B) Using a strong password policy
C) Encrypting sensitive data stored in a database
D) Using multi-factor authentication (MFA)
Answer: A
What is the purpose of database masking in database security?
A) To encrypt database backups
B) To hide sensitive data from unauthorized users
C) To enforce role-based access control
D) To manage encryption keys
Answer: B
Which of the following is an example of database masking?
A) Encrypting credit card numbers stored in a database
B) Replacing sensitive data with realistic but fictional data
C) Using HTTPS for database connections
D) Using a strong password policy
Answer: B
What is the purpose of database auditing in database security?
A) To encrypt database backups
B) To monitor and record database activities
C) To enforce role-based access control
D) To manage encryption keys
Answer: B
Which of the following is a benefit of database auditing?
A) Simplifying access control management
B) Ensuring data integrity
C) Monitoring and detecting unauthorized access
D) Securing data during transmission
Answer: C
What is the purpose of database hardening in database security?
A) To encrypt database backups
B) To secure the database environment by reducing vulnerabilities
C) To manage encryption keys
D) To enforce role-based access control
Answer: B