Professional Documents
Culture Documents
Finished
Wednesday, 28 February 2024, 8:24 AM
7 secs
out of 10.00 ( %)
Not answered
Marked out of
Select one:
1.00
a. Web server
b. Application server
c. Database server
In today’s database technology, what is the most common way to authenticate a user for access to a
database?
Not answered
Marked out of
Select one:
1.00
a. Token-Ring-Authentication
b. Retina Scan
c. Two-factor-Authentication
d. Fingerprint Authentication
What needs to be done with respect to personnel getting access to the database
e. Data Normalization
c. System Privileges
d. Subject Privileges
e. Phantom Privileges
What kind of Access Control method can be used instead of RBAC without losing any functionality?
Not answered
Marked out of
Select one:
1.00
a. Automatization
b. Authentication
c. Authorization
d. Data Dumping
e. Enhancement
Marked out of
Select one:
1.00
a. You shut down the database.
e. You do nothing.
What is LDAP?