DBMS FINAL EXAM MCQ 2024-25

DBMS FINAL EXAM MCQ 2024-25

University

30 Qs

quiz-placeholder

Similar activities

Quiz on Systems Architecture

Quiz on Systems Architecture

University

33 Qs

Identification Quiz

Identification Quiz

University

25 Qs

ICT database (201-234)

ICT database (201-234)

University

34 Qs

Kuis_01 Data Warehouse

Kuis_01 Data Warehouse

University

30 Qs

Finals Quiz

Finals Quiz

University

25 Qs

Danger online

Danger online

7th Grade - University

25 Qs

GPC_IT Networking Mar 25, 2025

GPC_IT Networking Mar 25, 2025

University

25 Qs

DA200 Quiz Extravaganza

DA200 Quiz Extravaganza

University

30 Qs

DBMS FINAL EXAM MCQ 2024-25

DBMS FINAL EXAM MCQ 2024-25

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

JONARD LOPEZ

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which model restricts access based on security classifications of both users and data?

Role-Based Access Control

Mandatory Access Control

Discretionary Access Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main risk of improperly configured database backup storage?

It slows down data restoration.

It increases license costs.

It may expose sensitive historical data.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which situation is RSA preferred over AES?

Encrypting large database files

Encrypting small pieces of data or keys

Real-time communication of logs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model is most flexible but can lead to privilege sprawl if unmanaged?

Discretionary Access Control

Role-Based Access Control

Mandatory Access Control

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is malware considered a serious database threat?

It only affects user interface settings.

It can silently extract data and credentials.

It can only function in offline environments.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A key feature of RBAC is that:

Roles are assigned based on user behavior analytics

Each user manually configures their own privileges

Permissions are grouped by job functions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one limitation of password-based authentication?

It cannot be used on mobile devices

It is immune to phishing

It is vulnerable to brute-force attacks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?