You are on page 1of 4

Wednesday, 28 February 2024, 8:24 AM

Finished
Wednesday, 28 February 2024, 8:24 AM
6 secs
out of 10.00 ( %)

What kind of Access Control method can be used instead of RBAC without losing any functionality?

Not answered Select one:


Marked out of a. Mnemonic Access Control
1.00
b. Mannerism Access Control

c. Manifested Access Control

d. Mandatory Access Control

e. Maximal Access Control

Maximal Access Control

Your answer is incorrect.


The correct answer is: Mandatory Access Control

What is the function of access control?

Not answered Select one:


Marked out of a. It provides 100% database security.
1.00
b. It ensures an error-free data quality.

c. It controls the access of the database to the user.

d. It enables a regular backup of the database.

Your answer is incorrect.


The correct answer is: It controls the access of the database to the user.
If you wish to observe a database to ensure nothing strange happens with user access and the data,
what do you best do as a �rst step?
Not answered

Marked out of
Select one:
1.00
a. You shut down the database.

b. You delete the data.

c. You contact the users.

d. You run a database audit.

e. You do nothing.

Your answer is incorrect.


The correct answer is: You run a database audit.

What is achieved by restricting values of data and operations on data?

Not answered Select one:


Marked out of a. Identity Control
1.00
b. Integrity Control

c. Access Control

d. Performance Control

e. Control Logic

Your answer is incorrect.


The correct answer is: Integrity Control

What happens if you turn on Native Audit for databases?

Not answered Select one:


Marked out of a. Security may be reduced but performance is enhanced.
1.00
b. Performance may be reduced but security is enhanced.

c. Security and performance are both enhanced.

d. Security and performance are both reduced.

e. None of the above.

Your answer is incorrect.


The correct answer is: Performance may be reduced but security is enhanced.
In a three-tier application model, which level is responsible for authentication?

Not answered

Marked out of
Select one:
1.00
a. Web server

b. Application server

c. Database server

d. All of the above

e. None of the above

Your answer is incorrect.


The correct answer is: Application server

What is the meaning of the acronym LBAC?

Not answered Select one:


Marked out of a. Logic Based Access Control
1.00
b. Logic Bound Access Control

c. List Based Access Control

d. List Bound Access Control

e. Label Based Access Control

Your answer is incorrect.


The correct answer is: Label Based Access Control

LBAC means Label-based Access Control. Regarding databases, an additional and more recent
meaning of the same acronym has been established. What is it?
Not answered

Marked out of
Select one:
1.00
a. Least Bytes Access Control

b. Lossless Bias Access Control

c. Lattice-based Access Control

d. List-based Access Control

e. Least Bad Access Control

Your answer is incorrect.


The correct answer is: Lattice-based Access Control
What is LDAP?

Not answered Select one:


Marked out of a. Less Data with Active Problems
1.00
b. Little Density Accumulated Permutation

c. Lightweight Directory Access Protocol

d. Loss and Discovery Announcement Protocol

e. List Doctoring Allure Procedure

Your answer is incorrect.


The correct answer is: Lightweight Directory Access Protocol

What needs to happen as �rst step to connect to a database?

Not answered

Marked out of
Select one:
1.00
a. Automatization

b. Authentication

c. Authorization

d. Data Dumping

e. Enhancement

Your answer is incorrect.


The correct answer is: Authentication

You might also like