Chapter 8 : Database Security

Chapter 8 : Database Security

University

10 Qs

quiz-placeholder

Similar activities

DBMS

DBMS

University

15 Qs

DBMS LAB QUIZ

DBMS LAB QUIZ

University

15 Qs

Data base Management System

Data base Management System

University

11 Qs

DBMS

DBMS

University

10 Qs

Database gp1

Database gp1

University

10 Qs

INTRODUCTION TO DATABASE SYSTEM

INTRODUCTION TO DATABASE SYSTEM

University

10 Qs

Pengenalan Dasar Basis Data

Pengenalan Dasar Basis Data

University

15 Qs

Databases Week 2 Review

Databases Week 2 Review

12th Grade - Professional Development

12 Qs

Chapter 8 : Database Security

Chapter 8 : Database Security

Assessment

Quiz

Computers

University

Easy

Created by

MS. AIZA

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is database security ?

Destroy data

Share data to other people

Delete data

Protect and secure data

Answer explanation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why we need database ?

To store a text

To store a collection of data

To store an audio

To store a video

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are components in database security ?

Data

Hardware parts

Human resources

All of them

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Why database security is important ?

Prevent any harm to brand reputation

Business continuity

Help business to breach the data

Able to delete malware

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the functions of DBMS ?

Optimise storage

Processing and creating forms

Manage data

Retrieve data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DBMS offers a systematic approach to manage databases via an interface.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are an example of insider threats except

Accessing data that are assigned with permission

Sharing sensitive data to outsiders

Destroying private data that is not allowed to

Copying files or data hoarding from sensitive folders

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?