You are on page 1of 4

Wednesday, 28 February 2024, 8:24 AM

Finished
Wednesday, 28 February 2024, 8:24 AM
6 secs
out of 10.00 ( %)

Which main objectives are relevant for database security?

Not answered Select one:


Marked out of a. Atomicity, Consistency, Isolation, Durability
1.00
b. Content, Satisfaction, Usability

c. Economy, Ecology, Empathy

d. Privacy, Integrity, Availability

e. Security, Security, Security

Your answer is incorrect.


The correct answer is: Privacy, Integrity, Availability

In Role based access control, what does a role do?

Not answered Select one:


Marked out of a. A role controls access to the database according to certain user privileges.
1.00
b. A role is gives certain responsibilities to the user on a voluntary basis.

c. A role always gives the user admin rights.

d. A role ensures that the user gets a weekly update on the latest database activities.

e. A role ensures that the user can �nd valuable data by using the element of chance. Each
time the user logs on the database the role “rolls” a virtual dice and then the user gets
access to a random data entry.

Your answer is incorrect.


The correct answer is: A role controls access to the database according to certain user privileges.
What is the most important thing necessary for a successful disaster recovery (with respect to
databases).
Not answered

Marked out of
Select one:
1.00
a. Insurance

b. Manpower

c. Emergency power for Electricity

d. Oxygen Supply

e. Backup

Your answer is incorrect.


The correct answer is: Backup

When speaking of Role-based Access Control, which Acronym is typically used?

Not answered

Marked out of
Select one:
1.00
a. ROBAC

b. ROLAC

c. RBAC

d. ROLBAC

Your answer is incorrect.


The correct answer is: RBAC

Due to a malfunction in the co�ee maker, your company’s data center burns down. Fortunately,
everything is safely stored elsewhere in a backup server. Which security objective still gets
Not answered compromised?
Marked out of
1.00 Select one:

a. Usability

b. Privacy

c. Availability

d. Atomicity

e. Nonrepudiability

Your answer is incorrect.


The correct answer is: Availability
What do you need to do the following operation: create database.

Not answered Select one:


Marked out of a. Object Privileges
1.00
b. Data Privileges

c. System Privileges

d. Subject Privileges

e. Phantom Privileges

Your answer is incorrect.


The correct answer is: System Privileges

What needs to be done with respect to personnel getting access to the database

Not answered Select one:


Marked out of a. Performance monitoring
1.00
b. Privacy and Protection

c. Data integrity routines

d. Authorization and Authentication

e. Data Normalization

Your answer is incorrect.


The correct answer is: Authorization and Authentication

In today’s database technology, what is the most common way to authenticate a user for access to a
database?
Not answered

Marked out of
Select one:
1.00
a. Token-Ring-Authentication

b. Retina Scan

c. Two-factor-Authentication

d. Fingerprint Authentication

e. Infrared face scan

Your answer is incorrect.


The correct answer is: Two-factor-Authentication
What are the three primary rules for RBAC?

Not answered Select one:


Marked out of a. Role assignment, role authorization, permission authorization
1.00
b. Role assignment, role authentication, permission assignment

c. Role authorization, database authorization, permission authorization

d. Role assignment, role revocation, permission recovery

e. Role auditing, data prioritization, permission prioritization

Your answer is incorrect.


The correct answer is: Role assignment, role authorization, permission authorization

In DB2, what can the user with the SYSCTRL authority do?

Not answered Select one:


Marked out of a. add data
1.00
b. delete data

c. access data from tables

d. create, update, start and stop the database

e. create and update nested database tables

Your answer is incorrect.


The correct answer is: create, update, start and stop the database

You might also like