Search Header Logo

Database Design & Development- Testing & Security 1

Authored by Nicole Donnelly

Computers

University

Used 5+ times

Database Design & Development- Testing & Security 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the principle of least privilege entail in database security?

Granting users full access by default

Denying all access to users by default

Granting users the minimum level of access required

Granting users access based on their seniority

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves inserting malicious SQL statements into an entry field?

Phishing

SQL Injection

Cross-site scripting

Man-in-the-middle

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of the CIA triad is most concerned with ensuring data is accurate and trustworthy?

Confidentiality

Integrity

Availability

Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the meaning of 'data masking' in the context of database security?

Encrypting data for secure transmission

Hiding data by scrambling it

Deleting redundant data

Copying data to a secure location

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During database testing, what is the purpose of a 'stress test'?

To check the database for vulnerabilities

To evaluate database performance under heavy load

To verify data integrity

To ensure database backup procedures are working

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method for ensuring data integrity in a database?

Data Encryption

Data Validation

Data Masking

Data Backups

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary objective of white box testing in databases?

To verify the database schema

To validate database transactions

To check the internal logic of stored procedures and functions

To confirm data integrity constraints

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers