Exam 5: Database and Cloud Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a discretionary access control environment database users are classified into three broad categories: administrator, end user other than application owner, and __________.

Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Verified

application owner

A single countermeasure is sufficient for SQLi attacks.

Free
(True/False)
4.8/5
(51)
Correct Answer:
Verified

False

A data center generally includes backup power supplies.

Free
(True/False)
4.9/5
(41)
Correct Answer:
Verified

True

The value of a primary key must be unique for each tuple of its table.

(True/False)
4.7/5
(38)

A __________ is a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications.

(Short Answer)
4.8/5
(34)

In addition to granting and revoking access rights to a table, in a ___________ administration the owner of the table may grant and revoke authorization rights to other users, allowing them to grant and revoke access rights to the table.

(Short Answer)
4.8/5
(26)

The information transfer path by which unauthorized data is obtained is referred to as an ___________ channel.

(Short Answer)
4.8/5
(30)

Two disadvantages to database encryption are key management andinflexibility.

(True/False)
4.8/5
(40)

A query language provides a uniform interface to the database.

(True/False)
4.8/5
(41)

A __________ is an enterprise facility that houses a large number of servers, storage devices, and network switches and equipment.

(Short Answer)
4.7/5
(36)

A(n) __________ is a user who has administrative responsibility for part or all of the database.

(Multiple Choice)
4.8/5
(35)

A _________ is defined to be a portion of a row used to uniquely identify a row in a table.

(Multiple Choice)
4.8/5
(34)

__________ is a standardized language that can be used to define schema, manipulate, and query data in a relational database.

(Short Answer)
4.9/5
(27)

__________ houses cross-connects and active equipment for distributing cable to the equipment distribution area.

(Multiple Choice)
4.8/5
(27)

Site security of the data center itself includes barriers to entry, coupled withauthentication techniques for gaining physical access.

(True/False)
4.9/5
(41)

To create a relationship between two tables, the attributes that define theprimary key in one table must appear as attributes in another table, where they are referred to as a foreign key.

(True/False)
4.7/5
(37)

A foreign key value can appear multiple times in a table.

(True/False)
4.9/5
(37)

In a ___________ administration a small number of privileged users may grant and revoke access rights.

(Short Answer)
4.9/5
(25)

The __________ form of attack injects code in one or more conditional statements so they always evaluate to true.

(Short Answer)
4.9/5
(34)

In relational database parlance, the basic building block is a __________, which is a flat table.

(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)