- What is the primary purpose of Role-Based Access Control (RBAC) in a DBMS?
a) To encrypt data stored in the database
b) To define user roles and assign permissions based on these roles
c) To manage database performance
d) To handle database backups and recoveryAnswer: b) To define user roles and assign permissions based on these roles - In RBAC, what is a “role”?
a) A set of data encryption keys
b) A specific function or job description within the organization
c) A collection of permissions assigned to users
d) A set of database tablesAnswer: c) A collection of permissions assigned to users - What is the main benefit of using RBAC over Discretionary Access Control (DAC)?
a) RBAC is simpler to implement and manage in large organizations
b) RBAC provides finer-grained access control
c) RBAC eliminates the need for authentication
d) RBAC allows for more flexible permission assignmentsAnswer: a) RBAC is simpler to implement and manage in large organizations - Which of the following best describes the concept of “least privilege” in RBAC?
a) Users are given the maximum permissions possible
b) Users are granted only the permissions necessary to perform their roles
c) Users can only access data related to their personal information
d) Users have unlimited access to all database resourcesAnswer: b) Users are granted only the permissions necessary to perform their roles - In RBAC, what does “role inheritance” refer to?
a) The ability of a role to inherit permissions from another role
b) The process of transferring data ownership between users
c) The mechanism to automatically grant permissions to new users
d) The process of encrypting user passwordsAnswer: a) The ability of a role to inherit permissions from another role - Which of the following statements is true about role assignments in RBAC?
a) Roles can be assigned to users directly or through groups
b) Roles are assigned based on user preferences
c) Each user can have only one role at a time
d) Roles are assigned based on the user’s location in the organizationAnswer: a) Roles can be assigned to users directly or through groups - What is a “role hierarchy” in the context of RBAC?
a) A system for encrypting roles
b) A hierarchical structure where roles can inherit permissions from other roles
c) A method for creating multiple roles with identical permissions
d) A way to restrict role assignments to specific departmentsAnswer: b) A hierarchical structure where roles can inherit permissions from other roles - In RBAC, what is the difference between “role-based” and “attribute-based” access control?
a) Role-based access control uses attributes to determine permissions, while attribute-based access control uses roles.
b) Role-based access control assigns permissions based on roles, while attribute-based access control assigns permissions based on user attributes.
c) Role-based access control is less flexible than attribute-based access control.
d) Attribute-based access control does not use roles at all.Answer: b) Role-based access control assigns permissions based on roles, while attribute-based access control assigns permissions based on user attributes. - What is the typical role of a “security administrator” in an RBAC system?
a) To manage database performance
b) To handle data encryption
c) To define roles, assign permissions, and manage role assignments
d) To perform regular backups of the databaseAnswer: c) To define roles, assign permissions, and manage role assignments - How does RBAC help in regulatory compliance and auditability?
a) By providing detailed logs of all database transactions
b) By simplifying the process of granting and revoking permissions
c) By ensuring that only authorized users have access to sensitive data according to their roles
d) By automating the encryption of all dataAnswer: c) By ensuring that only authorized users have access to sensitive data according to their roles - In RBAC, what is a “user role assignment”?
a) The process of creating a new database table
b) The action of assigning a role to a user or group of users
c) The process of encrypting user data
d) The assignment of roles to database objectsAnswer: b) The action of assigning a role to a user or group of users - What is the role of “permission” in an RBAC system?
a) To define the data encryption standards
b) To determine the actions a user can perform on database objects
c) To manage user authentication methods
d) To create and modify database schemasAnswer: b) To determine the actions a user can perform on database objects - What does “RBAC” stand for?
a) Role-Based Access Control
b) Random-Based Access Control
c) Resource-Based Access Control
d) Role-Based Authentication ControlAnswer: a) Role-Based Access Control - Which RBAC component specifies what operations a user can perform on database objects?
a) Role
b) Permission
c) User
d) SessionAnswer: b) Permission - In RBAC, how can roles be used to simplify user management?
a) By assigning roles based on user preferences
b) By grouping permissions into roles and assigning roles to users rather than managing individual permissions
c) By automatically generating roles for each user
d) By encrypting user dataAnswer: b) By grouping permissions into roles and assigning roles to users rather than managing individual permissions
More MCQs Of Database Systems
- Database Models MCQs in DBMS
- Relational Database Model MCQs in DBMS
- SQL (Structured Query Language) MCQs in DBMS
- Database Design MCQs in DBMS
- Database Management System Architecture MCQs in DBMS
- Storage and File Structure MCQs in DBMS
- Query Processing and Optimization MCQs in DBMS
- Database Transaction Management MCQs in DBMS
- Database Security and Authorization MCQs in DBMS
- Backup and Recovery MCQs in DBMS
- Distributed Databases MCQs in DBMS
- SET 1: database design mcqs (database design mcqs )
- SET 2: database mcqs with answers pdf (database mcqs with answers pdf )
- SET 3: modern database management 12th edition mcqs (modern database management 12th edition mcqs)
- SET 4: database systems mcqs (database systems mcqs)
- SET 5: dbms mcqs (dbms mcqs )
- SET 6: dbms mcqs with answers (dbms mcqs with answers)
- SET 7: solved mcqs of dbms (solved mcqs of dbms)
- SET 8: dbms mcqs with answers pdf(dbms mcqs with answers pdf)
- SET 9: relational database management system mcqs(relational database management system mcqs)
- SET 10: solved mcqs of database management system(solved mcqs of database management system)
- SET 11: basic database mcqs pdf (basic database mcqs pdf)
- SET 12: relational database management system mcqs (relational database management system mcqs )
- SET 13: database mcqs online test (database mcqs online test)
- SET 14: database interview questions mcqs (database interview questions mcqs)
- SET 15: database developer mcqs (database developer mcqs)
- SET 16: database Repeated mcqs (database Repeated mcqs)
- SET 17: Database mcqs PPSC (Database mcqs PPSC)
- SET 18: Database mcqs FPSC (Database mcqs FPSC)
- SET 19: DBMS mcqs FPSC (DBMS mcqs FPSC)
New Arrival