ITBP301_Chapter 08

ITBP301_Chapter 08

University

10 Qs

quiz-placeholder

Similar activities

Understanding Data in Digital Services

Understanding Data in Digital Services

11th Grade - University

12 Qs

SURVEILLANCE CONTROL SYSTEM

SURVEILLANCE CONTROL SYSTEM

University

15 Qs

BIM30603 Quiz 1

BIM30603 Quiz 1

University

10 Qs

Cloud Computing and Virtualization

Cloud Computing and Virtualization

University

15 Qs

Cloud Computing (Unit 2)

Cloud Computing (Unit 2)

University

15 Qs

Firebase

Firebase

University

10 Qs

Advanced storage solutions

Advanced storage solutions

12th Grade - University

9 Qs

Three level architecture

Three level architecture

University

15 Qs

ITBP301_Chapter 08

ITBP301_Chapter 08

Assessment

Quiz

Computers

University

Easy

Created by

Tarek Elsaka

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of user in an RBAC system is responsible for managing sensitive or general roles?
Application owner
End user
Administrator
Guest user

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is an example of an inference channel?
Using metadata to deduce hidden relationships
Directly accessing a restricted column
Modifying a view definition
Backing up sensitive data

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which technique prevents inference attacks by adding noise to query results?
Query restriction
Data perturbation
View merging
Row-level locking

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which level of encryption applies to specific fields within a table?
Record-level encryption
Attribute-level encryption
Table-level encryption
Row-level encryption

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cloud deployment model is owned and operated by a single organization?
Public cloud
Private cloud
Community cloud
Hybrid cloud

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are types of administrative policies supported by DBMS access control systems? (Choose all that apply)
Centralized administration
Decentralized administration
Hierarchical administration
Ownership-based administration

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following best describes inference in database security? (Choose all that apply)
Unauthorized modification of data
Deduction of sensitive information from authorized queries
Use of metadata to infer hidden relationships
Direct access to restricted columns

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?