DBMS FINAL EXAM MCQ 2024-25

DBMS FINAL EXAM MCQ 2024-25

University

30 Qs

quiz-placeholder

Similar activities

Pemahaman DDL dan DML dalam Basisdata

Pemahaman DDL dan DML dalam Basisdata

University

30 Qs

Soal Pilihan Ganda - Dasar Komputer

Soal Pilihan Ganda - Dasar Komputer

10th Grade - University

25 Qs

Networking Quiz

Networking Quiz

University

26 Qs

Administrasi Server Jaringan - XI TKJ

Administrasi Server Jaringan - XI TKJ

11th Grade - University

25 Qs

Form 2 - Information Technology Quiz

Form 2 - Information Technology Quiz

8th Grade - University

25 Qs

Kuis_03 Big Data

Kuis_03 Big Data

University

30 Qs

UAS Data Warehouse & Business Intelligence

UAS Data Warehouse & Business Intelligence

University

25 Qs

Integrative Programming Concepts

Integrative Programming Concepts

University

32 Qs

DBMS FINAL EXAM MCQ 2024-25

DBMS FINAL EXAM MCQ 2024-25

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

JONARD LOPEZ

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which model restricts access based on security classifications of both users and data?

Role-Based Access Control

Mandatory Access Control

Discretionary Access Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main risk of improperly configured database backup storage?

It slows down data restoration.

It increases license costs.

It may expose sensitive historical data.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which situation is RSA preferred over AES?

Encrypting large database files

Encrypting small pieces of data or keys

Real-time communication of logs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model is most flexible but can lead to privilege sprawl if unmanaged?

Discretionary Access Control

Role-Based Access Control

Mandatory Access Control

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is malware considered a serious database threat?

It only affects user interface settings.

It can silently extract data and credentials.

It can only function in offline environments.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A key feature of RBAC is that:

Roles are assigned based on user behavior analytics

Each user manually configures their own privileges

Permissions are grouped by job functions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one limitation of password-based authentication?

It cannot be used on mobile devices

It is immune to phishing

It is vulnerable to brute-force attacks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?