Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice
Exam 5: Database Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
__________ is an organization that receives the encrypted data from a data owner and makes them available for distribution to clients.
Question 2
Short Answer
A __________ is a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications.
Question 3
True/False
The database management system operates on the assumption that the computer system has authenticated each user.
Question 4
True/False
A query language provides a uniform interface to the database.
Question 5
Short Answer
A _________ is the result of a query that returns selected rows and columns from one or more tables.
Question 6
True/False
SQL Server allows users to create roles that can then be assigned access rights to portions of the database.
Question 7
Short Answer
_________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Question 8
True/False
A foreign key value can appear multiple times in a table.
Question 9
Multiple Choice
The basic building block of a __________ is a table of data,consisting of rows and columns,similar to a spreadsheet.
Question 10
True/False
Random-sample query is a simple output perturbation technique.
Question 11
Short Answer
In a discretionary access control environment database users are classified into three broad categories: administrator,end user other than application owner,and __________.
Question 12
True/False
To create a relationship between two tables,the attributes that define the primary key in one table must appear as attributes in another table,where they are referred to as a foreign key.
Question 13
Multiple Choice
The __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
Question 14
Multiple Choice
Statistics are derived from a database by means of a ___________.
Question 15
Multiple Choice
A _________ is defined to be a portion of a row used to uniquely identify a row in a table.
Question 16
Short Answer
In a relational database columns are referred to as _________.
Question 17
Multiple Choice
__________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received.
Question 18
Short Answer
In addition to granting and revoking access rights to a table,in a ___________ administration the owner of the table may grant and revoke authorization rights to other users,allowing them to grant and revoke access rights to the table.