DBMS-Database Security Question and Answer

DBMS-Database Security Question and Answer
1. Database security encompasses hardware, sotware, network, people and data of the organisation.
  • TRUE
  • FALSE
Show Answer
2. Threats are any situation or event, whether intentional or accidental, that may adversely affect a system and consequently the organisation .
  • TRUE
  • FALSE
Show Answer
3. Authentication is a mechanism that determines whether a user is who he or she claims to be.
  • TRUE
  • FALSE
Show Answer
4. When a user is authenticated, he or she is verified as an authorized user of an application.
  • TRUE
  • FALSE
Show Answer
5. When a user is authenticated, he or she is verified as an authorized user of an application.
  • TRUE
  • FALSE
Show Answer
6. Authorization and authentication controls can be built into the software.
  • TRUE
  • FALSE
Show Answer
7. Provileges are granted to unsers at the discretion of other users.
  • TRUE
  • FALSE
Show Answer
8. A user automatically has all object privileges for the objects that are owned by him/her.
  • TRUE
  • FALSE
Show Answer
9. The REVOKE command is used to take away a privilege that was granted.
  • TRUE
  • FALSE
Show Answer
10. encryption access conrol (also called security scheme) is based on the concept of access rights (also called privileges) and mechanism for giving users such privileges.
  • TRUE
  • FALSE
Show Answer
Questions and Answers for Competitive Exams Various Entrance Test