Database Security

DIGITAL SECURITY > DATABASE SECURITY - Which of the following option signifies the importance of database security? ALL

Views 104 Downloads 0 File size 28KB

Report DMCA / Copyright

DOWNLOAD FILE

Recommend stories

Citation preview

DIGITAL SECURITY > DATABASE SECURITY

- Which of the following option signifies the importance of database security? ALL THE OPTIONS - _______ privileges allow a user to perform administrative operations in a database. ADMIN - ________ is an attack on a network or computer to make that computer or network unavailable to a legitimate user. DoS ATTACKS - Testing before deployment is not an essential step to ensure database security. FALSE - In information security, CIA stands for ________ CONFIDENTIALITY INTEGRITY AVAILABILITY

- DAM systems that are a hybrid between a true DAM system and a SIEM which relies on data generated by the database are called ___________ LOG-BASED DAM SYSTEMS - _______ provides means to monitor privileged users and application access independent of native database logging and audit functions. DATABASE ACTIVITY MONITORING (DAM) - “No unauthorized disclosure” is an objective of which aspect of database security? CONFIDENTIALITY - A high-level function that is responsible for the overall management of data resources in an organization DATA ADMINISTRATION - “No unauthorized modification” is an objective of which aspect of database security? INTEGRITY - The technical aspects of data are handled by ___ DATA ADMINISTRATOR - Which of the following options are principal classes of DoS attacks?

ALL THE APPLICATIONS - A method of creating a structurally similar but inauthentic version of an organization's data is most commonly known as: DATA MASKING - _______ mechanisms are used to protect data from indirect detections. CRYPTOGRAPHY - Databases that are not connected to the internet are safe from attacks. FALSE - ________ is exploited by influencing SQL statements that do not filter input from applications to a back-end database correctly. SQL INJECTION - __________ is achieved by distributing privileges for accomplishing a task to different people. PRINCIPLE OF LEAST PRIVILEGE - _______ mechanisms ensure that information contained in objects does not flow explicitly or implicitly into less protected objects. FLOW CONTROL - Which of the following option can be considered a target for SQL injection? EXCESSIVE PRIVILEGES - Cryptography ensures ____________________ CONFIDENTIALITY AND INTEGRITY - __________ identifies the database platforms within infrastructure and then examines their risk exposure. DATABASE RISK ASSESSMENT - Which of the following options are consequences of user privilege misuse? ALL THE OPTIONS - ______________ is used to enforce multilevel security by categorizing the data and users into various security classes. MANDATORY ACCESS CONTROL