You are on page 1of 4

Wednesday, 28 February 2024, 8:24 AM

Finished
Wednesday, 28 February 2024, 8:24 AM
7 secs
out of 10.00 ( %)

What happens if you turn on Native Audit for databases?

Not answered Select one:


Marked out of a. Security may be reduced but performance is enhanced.
1.00
b. Performance may be reduced but security is enhanced.

c. Security and performance are both enhanced.

d. Security and performance are both reduced.

e. None of the above.

Your answer is incorrect.


The correct answer is: Performance may be reduced but security is enhanced.

In a three-tier application model, which level is responsible for authentication?

Not answered

Marked out of
Select one:
1.00
a. Web server

b. Application server

c. Database server

d. All of the above

e. None of the above

Your answer is incorrect.


The correct answer is: Application server
What do you need to do the following operation: create database.

Not answered Select one:


Marked out of a. Object Privileges
1.00
b. Data Privileges

c. System Privileges

d. Subject Privileges

e. Phantom Privileges

Your answer is incorrect.


The correct answer is: System Privileges

What are the three primary rules for RBAC?

Not answered Select one:


Marked out of a. Role assignment, role authorization, permission authorization
1.00
b. Role assignment, role authentication, permission assignment

c. Role authorization, database authorization, permission authorization

d. Role assignment, role revocation, permission recovery

e. Role auditing, data prioritization, permission prioritization

Your answer is incorrect.


The correct answer is: Role assignment, role authorization, permission authorization

What kind of Access Control method can be used instead of RBAC without losing any functionality?

Not answered Select one:


Marked out of a. Mnemonic Access Control
1.00
b. Mannerism Access Control

c. Manifested Access Control

d. Mandatory Access Control

e. Maximal Access Control

Maximal Access Control

Your answer is incorrect.


The correct answer is: Mandatory Access Control
What needs to be done with respect to personnel getting access to the database

Not answered Select one:


Marked out of a. Performance monitoring
1.00
b. Privacy and Protection

c. Data integrity routines

d. Authorization and Authentication

e. Data Normalization

Your answer is incorrect.


The correct answer is: Authorization and Authentication

What needs to happen as �rst step to connect to a database?

Not answered

Marked out of
Select one:
1.00
a. Automatization

b. Authentication

c. Authorization

d. Data Dumping

e. Enhancement

Your answer is incorrect.


The correct answer is: Authentication

When speaking of Role-based Access Control, which Acronym is typically used?

Not answered

Marked out of
Select one:
1.00
a. ROBAC

b. ROLAC

c. RBAC

d. ROLBAC

Your answer is incorrect.


The correct answer is: RBAC
What is the most important thing necessary for a successful disaster recovery (with respect to
databases).
Not answered

Marked out of
Select one:
1.00
a. Insurance

b. Manpower

c. Emergency power for Electricity

d. Oxygen Supply

e. Backup

Your answer is incorrect.


The correct answer is: Backup

What is the meaning of the acronym LBAC?

Not answered Select one:


Marked out of a. Logic Based Access Control
1.00
b. Logic Bound Access Control

c. List Based Access Control

d. List Bound Access Control

e. Label Based Access Control

Your answer is incorrect.


The correct answer is: Label Based Access Control

You might also like