DBMS-Database Security Question and Answer

DBMS-Database Security Question and Answer
21. Mandatory access control (also called security scheme) is based on the concept of
  • access rights
  • system-wide policies
  • Both (a) and 9b)
  • None of these.
Show Answer
22. Loss of confidentiality means that the
  • data and system cannot be accessed by the users.
  • dinvalid and corrupted data has been generated
  • loss of protecting data from individuals.
  • loss of protecting data from individual.
Show Answer
23. Loss of privacy means that the
  • data and system cannot be accessed by the users
  • invalid and corrupted data has been generated
  • loss of protecting or maintaining secrecy over critical data of the organisation.
  • loss of protecting data from individuals.
Show Answer
24. Which of the following is the process by which a user's identity is checked ?
  • Authorization
  • Authentication
  • Access Control
  • None of these
Show Answer
25. Legal and ethical issues are related to the
  • rights to access of an individual user, or user groups to accesscertain information.
  • enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level.
  • Enforcement of the security policy of the organisation with respect to permitting access to various classification of data.
  • None of these.
Show Answer
26. Which of the following is the process by which a user's privileges are ascertained ?
  • Authorization
  • Authentication
  • Access Control
  • None of these
Show Answer
27. System-related issues are related to the
  • rights to access of an individual user or user groups to access certain information.
  • enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level.
  • enforcement of the security policy of the organisation with respect to permitting access to various classifications of data.
  • None of these.
Show Answer
28. Which of the following is the process by which a user's access to physical data in the application is limited, based on his privileges ?
  • Authorization
  • Authentication
  • Access Control
  • None of these
Show Answer
29. Organisation level issues are related to the:
  • rights to access of an individual user, or user groups to access certain information
  • enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level
  • enforcement of the security policy of the organisation with respect to permitting access to various classifications of data
  • None of these
Show Answer
30. Which of the following is a database privilege ?
  • The right to create a tablej or relation.
  • The right to select rows form another user's table.
  • The right to create a session
  • All of these
Show Answer
Questions and Answers for Competitive Exams Various Entrance Test