DBMS-Database Security Question and Answer
DBMS-Database Security Question and Answer
21. Mandatory access control (also called security scheme) is based on the concept of
- access rights
- system-wide policies
- Both (a) and 9b)
- None of these.
22. Loss of confidentiality means that the
- data and system cannot be accessed by the users.
- dinvalid and corrupted data has been generated
- loss of protecting data from individuals.
- loss of protecting data from individual.
23. Loss of privacy means that the
- data and system cannot be accessed by the users
- invalid and corrupted data has been generated
- loss of protecting or maintaining secrecy over critical data of the organisation.
- loss of protecting data from individuals.
24. Which of the following is the process by which a user's identity is checked ?
- Authorization
- Authentication
- Access Control
- None of these
25. Legal and ethical issues are related to the
- rights to access of an individual user, or user groups to accesscertain information.
- enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level.
- Enforcement of the security policy of the organisation with respect to permitting access to various classification of data.
- None of these.
26. Which of the following is the process by which a user's privileges are ascertained ?
- Authorization
- Authentication
- Access Control
- None of these
27. System-related issues are related to the
- rights to access of an individual user or user groups to access certain information.
- enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level.
- enforcement of the security policy of the organisation with respect to permitting access to various classifications of data.
- None of these.
28. Which of the following is the process by which a user's access to physical data in the application is limited, based on his privileges ?
- Authorization
- Authentication
- Access Control
- None of these
29. Organisation level issues are related to the:
- rights to access of an individual user, or user groups to access certain information
- enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level
- enforcement of the security policy of the organisation with respect to permitting access to various classifications of data
- None of these
30. Which of the following is a database privilege ?
- The right to create a tablej or relation.
- The right to select rows form another user's table.
- The right to create a session
- All of these