You are on page 1of 4

Wednesday, 28 February 2024, 8:23 AM

Finished
Wednesday, 28 February 2024, 8:24 AM
7 secs
out of 10.00 ( %)

In a three-tier application model, which level is responsible for authentication?

Not answered

Marked out of
Select one:
1.00
a. Web server

b. Application server

c. Database server

d. All of the above

e. None of the above

Your answer is incorrect.


The correct answer is: Application server

In today’s database technology, what is the most common way to authenticate a user for access to a
database?
Not answered

Marked out of
Select one:
1.00
a. Token-Ring-Authentication

b. Retina Scan

c. Two-factor-Authentication

d. Fingerprint Authentication

e. Infrared face scan

Your answer is incorrect.


The correct answer is: Two-factor-Authentication
What are the three primary rules for RBAC?

Not answered Select one:


Marked out of a. Role assignment, role authorization, permission authorization
1.00
b. Role assignment, role authentication, permission assignment

c. Role authorization, database authorization, permission authorization

d. Role assignment, role revocation, permission recovery

e. Role auditing, data prioritization, permission prioritization

Your answer is incorrect.


The correct answer is: Role assignment, role authorization, permission authorization

What happens if you turn on Native Audit for databases?

Not answered Select one:


Marked out of a. Security may be reduced but performance is enhanced.
1.00
b. Performance may be reduced but security is enhanced.

c. Security and performance are both enhanced.

d. Security and performance are both reduced.

e. None of the above.

Your answer is incorrect.


The correct answer is: Performance may be reduced but security is enhanced.

What needs to be done with respect to personnel getting access to the database

Not answered Select one:


Marked out of a. Performance monitoring
1.00
b. Privacy and Protection

c. Data integrity routines

d. Authorization and Authentication

e. Data Normalization

Your answer is incorrect.


The correct answer is: Authorization and Authentication
What do you need to do the following operation: create database.

Not answered Select one:


Marked out of a. Object Privileges
1.00
b. Data Privileges

c. System Privileges

d. Subject Privileges

e. Phantom Privileges

Your answer is incorrect.


The correct answer is: System Privileges

What kind of Access Control method can be used instead of RBAC without losing any functionality?

Not answered Select one:


Marked out of a. Mnemonic Access Control
1.00
b. Mannerism Access Control

c. Manifested Access Control

d. Mandatory Access Control

e. Maximal Access Control

Maximal Access Control

Your answer is incorrect.


The correct answer is: Mandatory Access Control

What needs to happen as �rst step to connect to a database?

Not answered

Marked out of
Select one:
1.00
a. Automatization

b. Authentication

c. Authorization

d. Data Dumping

e. Enhancement

Your answer is incorrect.


The correct answer is: Authentication
If you wish to observe a database to ensure nothing strange happens with user access and the data,
what do you best do as a �rst step?
Not answered

Marked out of
Select one:
1.00
a. You shut down the database.

b. You delete the data.

c. You contact the users.

d. You run a database audit.

e. You do nothing.

Your answer is incorrect.


The correct answer is: You run a database audit.

What is LDAP?

Not answered Select one:


Marked out of a. Less Data with Active Problems
1.00
b. Little Density Accumulated Permutation

c. Lightweight Directory Access Protocol

d. Loss and Discovery Announcement Protocol

e. List Doctoring Allure Procedure

Your answer is incorrect.


The correct answer is: Lightweight Directory Access Protocol

You might also like