Database Security

Database Security

Professional Development

20 Qs

quiz-placeholder

Similar activities

Understanding Von Neumann Architecture

Understanding Von Neumann Architecture

Professional Development

15 Qs

Exploring Digital Manufacturing Concepts

Exploring Digital Manufacturing Concepts

Professional Development

20 Qs

QUIZZERIA

QUIZZERIA

Professional Development

25 Qs

Operating System Concepts and Security Quiz-2

Operating System Concepts and Security Quiz-2

Professional Development

20 Qs

DATA SCIENCE 3 QUIZZ

DATA SCIENCE 3 QUIZZ

Professional Development

15 Qs

Database Security

Database Security

Assessment

Quiz

Engineering

Professional Development

Medium

Created by

ajith faculty

Used 7+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is required for controlling concurrent execution of the operations that take place on a database?

Serializable

Schedule

Concurrency Control

Lock Point

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

----------- algorithm starts by finding log records for operations that were not written to disk on crash and then replays all of them.

Shadow Paging

Two Phase Locking

Serial Schedules

ARIES

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In which lock the data item can be both reads as well as written by the transactions.

Exclusive Lock

Shared Lock

Two Phase Locking

Strict Two Phase Locking

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In which situation where in two or more transactions are waiting for each other to be finished but none of the task is willing to give up the resources that other task needs.

ARIES

Shadow Paging

Deadlock

Two Phase Locking

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which refers to the array of controls, tools, and procedures designed to ensure and safeguard confidentiality, integrity, and accessibility.

Database Security

SQL Injection Attacks

SQLi Attack Avenues

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

what serve as the first line of defense in DiD database security.

Data encryption

Authentication

Firewalls

Authorization

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

----------- is code injection technique that can compromise your database.

SQLi Attack Avenues

Data encryption

Auditing

SQL Injection

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?