Exam 5: Database Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ is an organization that receives the encrypted data from a data owner and makes them available for distribution to clients.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

A __________ is a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

database management system (DBMS)

The database management system operates on the assumption that the computer system has authenticated each user.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

A query language provides a uniform interface to the database.

(True/False)
4.9/5
(43)

A _________ is the result of a query that returns selected rows and columns from one or more tables.

(Short Answer)
4.9/5
(36)

SQL Server allows users to create roles that can then be assigned access rights to portions of the database.

(True/False)
4.7/5
(39)

_________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

(Short Answer)
4.9/5
(32)

A foreign key value can appear multiple times in a table.

(True/False)
4.9/5
(31)

The basic building block of a __________ is a table of data,consisting of rows and columns,similar to a spreadsheet.

(Multiple Choice)
4.9/5
(31)

Random-sample query is a simple output perturbation technique.

(True/False)
4.7/5
(36)

In a discretionary access control environment database users are classified into three broad categories: administrator,end user other than application owner,and __________.

(Short Answer)
4.9/5
(35)

To create a relationship between two tables,the attributes that define the primary key in one table must appear as attributes in another table,where they are referred to as a foreign key.

(True/False)
4.8/5
(30)

The __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

(Multiple Choice)
4.9/5
(32)

Statistics are derived from a database by means of a ___________.

(Multiple Choice)
4.7/5
(46)

A _________ is defined to be a portion of a row used to uniquely identify a row in a table.

(Multiple Choice)
4.8/5
(23)

In a relational database columns are referred to as _________.

(Short Answer)
4.9/5
(37)

__________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received.

(Multiple Choice)
4.8/5
(28)

In addition to granting and revoking access rights to a table,in a ___________ administration the owner of the table may grant and revoke authorization rights to other users,allowing them to grant and revoke access rights to the table.

(Short Answer)
4.7/5
(41)

The __________ is a human entity that presents requests (queries)to the system.

(Short Answer)
4.7/5
(34)

Fixed server roles operate at the level of an individual database.

(True/False)
4.8/5
(30)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)