Database Security - Quiz 6

Database Security - Quiz 6

1st - 5th Grade

15 Qs

quiz-placeholder

Similar activities

Year 6 eSafety Quiz

Year 6 eSafety Quiz

5th Grade

16 Qs

VPN

VPN

1st - 5th Grade

10 Qs

El Computador

El Computador

5th - 11th Grade

20 Qs

Class 1 L-  3 & 4.  CW Practice questions

Class 1 L- 3 & 4. CW Practice questions

1st Grade

20 Qs

ICT 5 EPP

ICT 5 EPP

5th - 6th Grade

10 Qs

C2-Q3-W1 REVIEW

C2-Q3-W1 REVIEW

2nd Grade

15 Qs

Q2 - W3 - REVIEW

Q2 - W3 - REVIEW

2nd Grade

10 Qs

Database Security - Quiz 6

Database Security - Quiz 6

Assessment

Quiz

Computers

1st - 5th Grade

Practice Problem

Medium

Created by

Hamidah Ibrahim

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

If an individual user can set an access control mechanism to allow or deny access to an object, that mechanism is a ________________.

Content-based Access Control

Mandatory Access Control Models (MAC)

Discretionary Access Control Models (DAC)

Role-Based Access Control (RBAC)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When a system mechanism controls access to an object and an individual user cannot alter that access, the control is a ________________.

Content-based Access Control

Mandatory Access Control Models (MAC)

Discretionary Access Control Models (DAC)

Role-Based Access Control (RBAC)

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security paradigm where users are granted access depending on their role in the organisation is called ________________.

Content-based Access Control

Mandatory Access Control Models (MAC)

Discretionary Access Control Models (DAC)

Role-Based Access Control (RBAC)

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The main drawback of DAC is ________________.

Trojan Horse

Trapdoor

Logic bomb

Spyware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A state, i.e. an access matrix M, is said to ________________ the right r if there exists a command c that adds the right r into an entry in the access matrix that previously did not contain r.

safe

grant

revoke

leak

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A state of a protection system, that is, its matrix M, is said to be ________________ with respect to the right r if no sequence of commands can transform M into a state that leaks r.

leak

safe

unsafe

exposed

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In ________________, the subject is authorised to use a requested system resource indirectly because the objects in the system are referenced in terms of other objects.

Negative authorisation

Positive authorisation

Implicit authorisation

Explicit authorisation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers