ITBP301_Chapter 08

ITBP301_Chapter 08

University

10 Qs

quiz-placeholder

Similar activities

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Mengenal Jendela dan Ikon Microsoft Excel

Mengenal Jendela dan Ikon Microsoft Excel

7th Grade - University

15 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

Fun with Computer Architecture

Fun with Computer Architecture

University

15 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

SegInt

SegInt

University

10 Qs

C++ Array Quiz

C++ Array Quiz

University

10 Qs

Software Testing

Software Testing

University

10 Qs

ITBP301_Chapter 08

ITBP301_Chapter 08

Assessment

Quiz

Computers

University

Easy

Created by

Tarek Elsaka

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of user in an RBAC system is responsible for managing sensitive or general roles?

Application owner
End user
Administrator
Guest user

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is an example of an inference channel?

Using metadata to deduce hidden relationships
Directly accessing a restricted column
Modifying a view definition
Backing up sensitive data

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which technique prevents inference attacks by adding noise to query results?

Query restriction
Data perturbation
View merging
Row-level locking

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which level of encryption applies to specific fields within a table?

Record-level encryption
Attribute-level encryption
Table-level encryption
Row-level encryption

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cloud deployment model is owned and operated by a single organization?

Public cloud
Private cloud
Community cloud
Hybrid cloud

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are types of administrative policies supported by DBMS access control systems? (Choose all that apply)

Centralized administration
Decentralized administration
Hierarchical administration
Ownership-based administration

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following best describes inference in database security? (Choose all that apply)

Unauthorized modification of data
Deduction of sensitive information from authorized queries
Use of metadata to infer hidden relationships
Direct access to restricted columns

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?