Exam 5: Database and Cloud Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The Telecommunications Industry Association standard _________ specifies the minimum requirements for telecommunications infrastructure of data centers.
(Short Answer)
4.8/5
(41)
Network security is extremely important in a facility in which such a largecollection of assets is concentrated in a single place and accessible by external network connections.
(True/False)
5.0/5
(25)
__________ encompasses intrusion detection, prevention and response.
(Multiple Choice)
5.0/5
(33)
Encryption becomes the last line of defense in database security.
(True/False)
4.8/5
(44)
A __________ language provides a uniform interface to the database for users and applications.
(Short Answer)
4.9/5
(38)
SQL Server allows users to create roles that can then be assigned accessrights to portions of the database.
(True/False)
4.8/5
(29)
The __________ attack typically works by prematurely terminating a text string and appending a new command.
(Short Answer)
4.8/5
(39)
__________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received.
(Multiple Choice)
4.8/5
(36)
A _________ is the result of a query that returns selected rows and columns from one or more tables.
(Short Answer)
4.9/5
(30)
The basic building block of a __________ is a table of data, consisting of rows and columns, similar to a spreadsheet.
(Multiple Choice)
4.9/5
(38)
A(n) __________ is a structured collection of data stored for use by one or more applications.
(Multiple Choice)
4.8/5
(33)
Security specifically tailored to databases is an increasingly importantcomponent of an overall organizational security strategy.
(True/False)
4.9/5
(30)
A view cannot provide restricted access to a relational database so it cannotbe used for security purposes.
(True/False)
4.9/5
(34)
Fixed server roles operate at the level of an individual database.
(True/False)
4.8/5
(35)
In a relational database columns are referred to as _________.
(Short Answer)
4.9/5
(43)
In a relational database rows are referred to as _________.
(Multiple Choice)
4.9/5
(30)
An end user who operates on database objects via a particular application but does not own any of the database objects is the __________.
(Multiple Choice)
4.9/5
(36)
_________, out-of-band, and inferential are the three main categories of SQLi attack types.
(Short Answer)
4.8/5
(34)
_________ is an organization that produces data to be made available for controlled release, either within the organization or to external users.
(Multiple Choice)
4.9/5
(31)
The database management system makes use of the database descriptiontables to manage the physical database.
(True/False)
4.9/5
(31)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)