Deck 5: Database and Cloud Security

Full screen (f)
exit full mode
Question
A query language provides a uniform interface to the database.
Use Space or
up arrow
down arrow
to flip the card.
Question
A view cannot provide restricted access to a relational database so it cannot
be used for security purposes.
Question
Fixed server roles operate at the level of an individual database.
Question
An IDS is a set of automated tools designed to detect unauthorized access to
a host system.
Question
An IPS incorporates IDS functionality but also includes mechanisms
designed to block traffic from intruders.
Question
The cloud carrier is useful when cloud services are too complex for a cloud
consumer to easily manage.
Question
The CSP can provide backup at multiple locations,with reliable failover
and disaster recovery facilities.
Question
A foreign key value can appear multiple times in a table.
Question
Business continuity consists of security services that allocate access,
distribute,monitor,and protect the underlying resource services.
.
Question
Encryption is a pervasive service that can be provided for data at rest in the
cloud.
.
Question
A single countermeasure is sufficient for SQLi attacks.
Question
T F 4.The value of a primary key must be unique for each tuple of its table.
Question
In a relational database rows are referred to as _________.

A)relations
B)attributes
C)views
D)tuples
Question
SQL Server allows users to create roles that can then be assigned access
rights to portions of the database.
Question
The database management system makes use of the database description
tables to manage the physical database.
.
Question
A _________ is defined to be a portion of a row used to uniquely identify a row in a table.

A)foreign key
B)query
C)primary key
D)data perturbation
Question
In relational database parlance,the basic building block is a __________,which is a flat table.

A)attribute
B)tuple
C)primary key
D)relation
Question
A(n)__________ is a structured collection of data stored for use by one or more applications.

A)attribute
B)database
C)tuple
D)inference
Question
The basic building block of a __________ is a table of data,consisting of rows and columns,similar to a spreadsheet.

A)relational database
B)query set
C)DBMS
D)perturbation
Question
To create a relationship between two tables,the attributes that define the
primary key in one table must appear as attributes in another table,where they are referred to as a foreign key.
Question
The information transfer path by which unauthorized data is obtained is referred to as an ___________ channel.
Question
__________ is an organization that receives the encrypted data from a data owner and makes them available for distribution to clients.

A)User
B)Client
C)Data owner
D)Server
Question
An end user who operates on database objects via a particular application but does not own any of the database objects is the __________.

A)application owner
B)end user other than application owner
C)foreign key
D)administrator
Question
__________ includes people,processes,and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified,and then granting the correct level of access based on this assured identity.

A)CSP
B)DLP
C)IAM
D)IPS
Question
A __________ is a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications.
Question
In a relational database columns are referred to as _________.
Question
In a ___________ administration a small number of privileged users may grant and revoke access rights.
Question
With ___________ administration the owner (creator)of a table may grant and revoke access rights to the table.
Question
The __________ is responsible both for the cloud infrastructure and for the control of data and operations within a public cloud.
Question
__________ encompasses intrusion detection,prevention and response.

A)Intrusion management
B)Security assessments
C)Database access control
D)Data loss prevention
Question
__________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received.

A)Perturbation
B)Inference
C)Compromise
D)Partitioning
Question
A _________ is the result of a query that returns selected rows and columns from one or more tables.
Question
A ___________ is a person or organization that maintains a business relationship with cloud providers.

A)cloud consumer
B)cloud auditor
C)cloud carrier
D)cloud broker
Question
The __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

A)hybrid
B)community
C)private
D)public
Question
_________ is an organization that produces data to be made available for controlled release,either within the organization or to external users.

A)Client
B)Data owner
C)User
D)Server
Question
A(n)__________ is a user who has administrative responsibility for part or all of the database.

A)administrator
B)database relations manager
C)application owner
D)end user other than application owner
Question
In a discretionary access control environment database users are classified into three broad categories: administrator,end user other than application owner,and __________.
Question
In addition to granting and revoking access rights to a table,in a ___________ administration the owner of the table may grant and revoke authorization rights to other users,allowing them to grant and revoke access rights to the table.
Question
__________ is a standardized language that can be used to define schema,manipulate,and query data in a relational database.
Question
A _________ is a virtual table.

A)tuple
B)query
C)view
D)DBMS
Question
The __________ cloud infrastructure is operated solely for an organization.
Question
The _________ model provides a predefined environment for the cloud subscriber that is shared with other tenants,typically through tagging data with a subscriber identifier.
Question
A __________ cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
Question
_________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Question
A __________ language provides a uniform interface to the database for users and applications.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Database and Cloud Security
1
A query language provides a uniform interface to the database.
True
2
A view cannot provide restricted access to a relational database so it cannot
be used for security purposes.
False
3
Fixed server roles operate at the level of an individual database.
False
4
An IDS is a set of automated tools designed to detect unauthorized access to
a host system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
An IPS incorporates IDS functionality but also includes mechanisms
designed to block traffic from intruders.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The cloud carrier is useful when cloud services are too complex for a cloud
consumer to easily manage.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The CSP can provide backup at multiple locations,with reliable failover
and disaster recovery facilities.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A foreign key value can appear multiple times in a table.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Business continuity consists of security services that allocate access,
distribute,monitor,and protect the underlying resource services.
.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Encryption is a pervasive service that can be provided for data at rest in the
cloud.
.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
A single countermeasure is sufficient for SQLi attacks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
T F 4.The value of a primary key must be unique for each tuple of its table.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
In a relational database rows are referred to as _________.

A)relations
B)attributes
C)views
D)tuples
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
SQL Server allows users to create roles that can then be assigned access
rights to portions of the database.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
The database management system makes use of the database description
tables to manage the physical database.
.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A _________ is defined to be a portion of a row used to uniquely identify a row in a table.

A)foreign key
B)query
C)primary key
D)data perturbation
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
In relational database parlance,the basic building block is a __________,which is a flat table.

A)attribute
B)tuple
C)primary key
D)relation
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
A(n)__________ is a structured collection of data stored for use by one or more applications.

A)attribute
B)database
C)tuple
D)inference
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
The basic building block of a __________ is a table of data,consisting of rows and columns,similar to a spreadsheet.

A)relational database
B)query set
C)DBMS
D)perturbation
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
To create a relationship between two tables,the attributes that define the
primary key in one table must appear as attributes in another table,where they are referred to as a foreign key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The information transfer path by which unauthorized data is obtained is referred to as an ___________ channel.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
__________ is an organization that receives the encrypted data from a data owner and makes them available for distribution to clients.

A)User
B)Client
C)Data owner
D)Server
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
An end user who operates on database objects via a particular application but does not own any of the database objects is the __________.

A)application owner
B)end user other than application owner
C)foreign key
D)administrator
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
__________ includes people,processes,and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified,and then granting the correct level of access based on this assured identity.

A)CSP
B)DLP
C)IAM
D)IPS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A __________ is a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
In a relational database columns are referred to as _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
In a ___________ administration a small number of privileged users may grant and revoke access rights.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
With ___________ administration the owner (creator)of a table may grant and revoke access rights to the table.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The __________ is responsible both for the cloud infrastructure and for the control of data and operations within a public cloud.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
__________ encompasses intrusion detection,prevention and response.

A)Intrusion management
B)Security assessments
C)Database access control
D)Data loss prevention
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
__________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received.

A)Perturbation
B)Inference
C)Compromise
D)Partitioning
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A _________ is the result of a query that returns selected rows and columns from one or more tables.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
A ___________ is a person or organization that maintains a business relationship with cloud providers.

A)cloud consumer
B)cloud auditor
C)cloud carrier
D)cloud broker
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

A)hybrid
B)community
C)private
D)public
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
_________ is an organization that produces data to be made available for controlled release,either within the organization or to external users.

A)Client
B)Data owner
C)User
D)Server
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A(n)__________ is a user who has administrative responsibility for part or all of the database.

A)administrator
B)database relations manager
C)application owner
D)end user other than application owner
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
In a discretionary access control environment database users are classified into three broad categories: administrator,end user other than application owner,and __________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
In addition to granting and revoking access rights to a table,in a ___________ administration the owner of the table may grant and revoke authorization rights to other users,allowing them to grant and revoke access rights to the table.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
__________ is a standardized language that can be used to define schema,manipulate,and query data in a relational database.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
A _________ is a virtual table.

A)tuple
B)query
C)view
D)DBMS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The __________ cloud infrastructure is operated solely for an organization.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The _________ model provides a predefined environment for the cloud subscriber that is shared with other tenants,typically through tagging data with a subscriber identifier.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
A __________ cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
_________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
A __________ language provides a uniform interface to the database for users and applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.