ITBP301_Chapter 08

ITBP301_Chapter 08

University

10 Qs

quiz-placeholder

Similar activities

FRE 101 | Cloud Storage and Securiy

FRE 101 | Cloud Storage and Securiy

University

15 Qs

Database Solution Development Quiz

Database Solution Development Quiz

University

14 Qs

Cloud Security

Cloud Security

University

10 Qs

Pengantar Pengelolaan Infrastruktur

Pengantar Pengelolaan Infrastruktur

University

10 Qs

DATABASE

DATABASE

University

15 Qs

H466 - 1.3.1 - Understanding Encryption Methods

H466 - 1.3.1 - Understanding Encryption Methods

12th Grade - University

15 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Introduction to windows server 2016

Introduction to windows server 2016

University

15 Qs

ITBP301_Chapter 08

ITBP301_Chapter 08

Assessment

Quiz

Computers

University

Easy

Created by

Tarek Elsaka

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of user in an RBAC system is responsible for managing sensitive or general roles?
Application owner
End user
Administrator
Guest user

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is an example of an inference channel?
Using metadata to deduce hidden relationships
Directly accessing a restricted column
Modifying a view definition
Backing up sensitive data

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which technique prevents inference attacks by adding noise to query results?
Query restriction
Data perturbation
View merging
Row-level locking

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which level of encryption applies to specific fields within a table?
Record-level encryption
Attribute-level encryption
Table-level encryption
Row-level encryption

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cloud deployment model is owned and operated by a single organization?
Public cloud
Private cloud
Community cloud
Hybrid cloud

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are types of administrative policies supported by DBMS access control systems? (Choose all that apply)
Centralized administration
Decentralized administration
Hierarchical administration
Ownership-based administration

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following best describes inference in database security? (Choose all that apply)
Unauthorized modification of data
Deduction of sensitive information from authorized queries
Use of metadata to infer hidden relationships
Direct access to restricted columns

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?