Exam 5: Database and Cloud Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Telecommunications Industry Association standard _________ specifies the minimum requirements for telecommunications infrastructure of data centers.

(Short Answer)
4.8/5
(41)

Network security is extremely important in a facility in which such a largecollection of assets is concentrated in a single place and accessible by external network connections.

(True/False)
5.0/5
(25)

__________ encompasses intrusion detection, prevention and response.

(Multiple Choice)
5.0/5
(33)

Encryption becomes the last line of defense in database security.

(True/False)
4.8/5
(44)

A __________ language provides a uniform interface to the database for users and applications.

(Short Answer)
4.9/5
(38)

SQL Server allows users to create roles that can then be assigned accessrights to portions of the database.

(True/False)
4.8/5
(29)

The __________ attack typically works by prematurely terminating a text string and appending a new command.

(Short Answer)
4.8/5
(39)

__________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received.

(Multiple Choice)
4.8/5
(36)

A _________ is the result of a query that returns selected rows and columns from one or more tables.

(Short Answer)
4.9/5
(30)

The basic building block of a __________ is a table of data, consisting of rows and columns, similar to a spreadsheet.

(Multiple Choice)
4.9/5
(38)

A(n) __________ is a structured collection of data stored for use by one or more applications.

(Multiple Choice)
4.8/5
(33)

Security specifically tailored to databases is an increasingly importantcomponent of an overall organizational security strategy.

(True/False)
4.9/5
(30)

A view cannot provide restricted access to a relational database so it cannotbe used for security purposes.

(True/False)
4.9/5
(34)

Fixed server roles operate at the level of an individual database.

(True/False)
4.8/5
(35)

In a relational database columns are referred to as _________.

(Short Answer)
4.9/5
(43)

In a relational database rows are referred to as _________.

(Multiple Choice)
4.9/5
(30)

An end user who operates on database objects via a particular application but does not own any of the database objects is the __________.

(Multiple Choice)
4.9/5
(36)

_________, out-of-band, and inferential are the three main categories of SQLi attack types.

(Short Answer)
4.8/5
(34)

_________ is an organization that produces data to be made available for controlled release, either within the organization or to external users.

(Multiple Choice)
4.9/5
(31)

The database management system makes use of the database descriptiontables to manage the physical database.

(True/False)
4.9/5
(31)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)