---Advertisement---
Digital Security

Database Security Interview Question-Answer

By Smart Answer

Updated on:

---Advertisement---

Q.1 Which of the following option signifies the importance of database security?

       A. Helps keep sensitive information safe

       B. Increases reliability

       C. Prevents data loss

       D. Prevents cyber attacks

       E. All the options

Ans : All the options


Q.2 _______ privileges allow a user to perform administrative operations in a database.

       A. Data

       B. Admin

       C. System

       D. Object

Ans : System


Q.3 ________ is an attack on a network or computer to make that computer or network unavailable to a legitimate user.

       A. DoS attacks

       B. SQL injection attacks

       C. Malware attacks

       D. Zero day attacks

Ans : DoS attacks


Q.4 Audit Trails help prevent attacks against databases.

       A. True

       B. False

Ans : False


Q.5 Testing before deployment is not an essential step to ensure database security.

       A. True

       B. False

Ans : False


Q.6 Databases that are not connected to the internet are safe from attacks.

       A. True

       B. False

Ans : False


Q.7 “No unauthorized modification” is an objective of which aspect of database security?

       A. Accountability

       B. Availability

       C. Integrity

       D. Confidentiality

Ans : Integrity


Q.8 Cryptography ensures ___________.

       A. Confidentiality and Integrity

       B. Confidentiality and Accountability

       C. Confidentiality and Availability

Ans : Confidentiality and Accountability


Q.9 A method of creating a structurally similar but inauthentic version of an organization’s data is most commonly known as:

       A. Cryptography

       B. Obfuscation

       C. Data replication

       D. Data Masking

Ans : Data Masking


Q.10 An administrative function responsible for managing data quality and assuring that organizational applications meet the enterprise goals.

       A. Database Administration

       B. Database Steward

       C. Data Administration

Ans : Database Steward


Q.11 The technical aspects of data are handled by ____________

       A. Data administrator

       B. Database Administrator

       C. Database Steward

Ans : Database Administrator


Q.12 The process in which the application aggregates all user traffic within a few database connections that are identified only by a generic service account name is called _______________.

       A. Data Masking

       B. Identity Pooling

       C. Connection Pooling

       D. Identity Masking

Ans : Connection Pooling


Q.13 _______ mechanisms ensure that information contained in objects does not flow explicitly or implicitly into less protected objects.

       A. Flow control

       B. Inference control

       C. Access control

Ans : Flow control


Q.14 A high-level function that is responsible for the overall management of data resources in an organization.

       A. Data Administration

       B. Database Steward

       C. Database Administration

Ans : Data Administration


Q.15 __________ is achieved by distributing privileges for accomplishing a task to different people.

       A. Privilege Escalation

       B. Separation of duties

       C. Principle of Least Privilege

Ans : Separation of duties


Q.16 _________ ensures that all direct accesses to the system objects occur base on modes and rules fixed by protection policies.

       A. Access control

       B. Inference control

       C. Database Monitoring

       D. Data Administration

Ans : Access control


Q.17 ________aims to replace sensitive data in transit leaving the original at-rest data intact and unaltered.

       A. Static Data Masking

       B. Dynamic Data Masking

Ans : Dynamic Data Masking


Q.18 DAM systems that are a hybrid between a true DAM system and a SIEM which relies on data generated by the database are called ___________.

       A. Log-based DAM Systems

       B. Interception-based DAM Systems

       C. Memory-based DAM Systems

Ans : Log-based DAM Systems


Q.19 ____________ allows for the use of certain operations on database objects as authorized by another user.

       A. Admin privileges

       B. System privileges

       C. Object Privileges

Ans : Object Privileges


Q.20 DAM architecture in which a lightweight sensor is attached to the protected databases and continuously polls the system global area (SGA) to collect SQL statements. Choose the appropriate option that closely matches the given statement.

       A. Network Architecture

       B. Log-based architecture

       C. Interception-based architecture

       D. Memory-based architecture

Ans : Memory-based architecture


Q.21 Which of the following options are principal classes of DoS attacks?

       A. Bugs in database

       B. Complex Queries

       C. Abuse of functions

       D. Application usage

       E. All the applications

Ans : All the applications


Q.22 Which of the following options are consequences of user privilege misuse?

       A. Falsifies alert investigation

       B. Data manipulation

       C. Unauthorized access

       D. All the options

Ans : All the options


Q.23 “No unauthorized disclosure” is an objective of which aspect of database security?

       A. Accountability

       B. Availability

       C. Integrity

       D. Confidentiality

Ans : Confidentiality


Smart Answer

---Advertisement---

Related Post

Cyber Security Interview Question-Answer Part – 3

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question-Answer Part – 1 Cyber Security Interview Question-Answer Part – 2 Q.1 Which of the following can also consider as the ...

Cyber Security Interview Question-Answer Part – 2

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question- – 1 Cyber Security Interview Question- – 3 Q.1 Which of the following can be considered as the elements of ...

Cyber Security Interview Question-Answer

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question-Answer Part – 2 Cyber Security Interview Question-Answer Part – 3 Q.1 Which of the following refers to stealing one’s idea ...

User Authentication Interview Question-Answer part – 2

Authentication Interview Question-Answer Q.1 Which of the following is a good practice?        A. Give full permission for remote transferring        B. Grant read ...

Leave a Comment