Q.1 Which of the following option signifies the importance of database security?
A. Helps keep sensitive information safe
B. Increases reliability
C. Prevents data loss
D. Prevents cyber attacks
E. All the options
Ans : All the options
Q.2 _______ privileges allow a user to perform administrative operations in a database.
A. Data
B. Admin
C. System
D. Object
Ans : System
Q.3 ________ is an attack on a network or computer to make that computer or network unavailable to a legitimate user.
A. DoS attacks
B. SQL injection attacks
C. Malware attacks
D. Zero day attacks
Ans : DoS attacks
Q.4 Audit Trails help prevent attacks against databases.
A. True
B. False
Ans : False
Q.5 Testing before deployment is not an essential step to ensure database security.
A. True
B. False
Ans : False
Q.6 Databases that are not connected to the internet are safe from attacks.
A. True
B. False
Ans : False
Q.7 “No unauthorized modification” is an objective of which aspect of database security?
A. Accountability
B. Availability
C. Integrity
D. Confidentiality
Ans : Integrity
Q.8 Cryptography ensures ___________.
A. Confidentiality and Integrity
B. Confidentiality and Accountability
C. Confidentiality and Availability
Ans : Confidentiality and Accountability
Q.9 A method of creating a structurally similar but inauthentic version of an organization’s data is most commonly known as:
A. Cryptography
B. Obfuscation
C. Data replication
D. Data Masking
Ans : Data Masking
Q.10 An administrative function responsible for managing data quality and assuring that organizational applications meet the enterprise goals.
A. Database Administration
B. Database Steward
C. Data Administration
Ans : Database Steward
Q.11 The technical aspects of data are handled by ____________
A. Data administrator
B. Database Administrator
C. Database Steward
Ans : Database Administrator
Q.12 The process in which the application aggregates all user traffic within a few database connections that are identified only by a generic service account name is called _______________.
A. Data Masking
B. Identity Pooling
C. Connection Pooling
D. Identity Masking
Ans : Connection Pooling
Q.13 _______ mechanisms ensure that information contained in objects does not flow explicitly or implicitly into less protected objects.
A. Flow control
B. Inference control
C. Access control
Ans : Flow control
Q.14 A high-level function that is responsible for the overall management of data resources in an organization.
A. Data Administration
B. Database Steward
C. Database Administration
Ans : Data Administration
Q.15 __________ is achieved by distributing privileges for accomplishing a task to different people.
A. Privilege Escalation
B. Separation of duties
C. Principle of Least Privilege
Ans : Separation of duties
Q.16 _________ ensures that all direct accesses to the system objects occur base on modes and rules fixed by protection policies.
A. Access control
B. Inference control
C. Database Monitoring
D. Data Administration
Ans : Access control
Q.17 ________aims to replace sensitive data in transit leaving the original at-rest data intact and unaltered.
A. Static Data Masking
B. Dynamic Data Masking
Ans : Dynamic Data Masking
Q.18 DAM systems that are a hybrid between a true DAM system and a SIEM which relies on data generated by the database are called ___________.
A. Log-based DAM Systems
B. Interception-based DAM Systems
C. Memory-based DAM Systems
Ans : Log-based DAM Systems
Q.19 ____________ allows for the use of certain operations on database objects as authorized by another user.
A. Admin privileges
B. System privileges
C. Object Privileges
Ans : Object Privileges
Q.20 DAM architecture in which a lightweight sensor is attached to the protected databases and continuously polls the system global area (SGA) to collect SQL statements. Choose the appropriate option that closely matches the given statement.
A. Network Architecture
B. Log-based architecture
C. Interception-based architecture
D. Memory-based architecture
Ans : Memory-based architecture
Q.21 Which of the following options are principal classes of DoS attacks?
A. Bugs in database
B. Complex Queries
C. Abuse of functions
D. Application usage
E. All the applications
Ans : All the applications
Q.22 Which of the following options are consequences of user privilege misuse?
A. Falsifies alert investigation
B. Data manipulation
C. Unauthorized access
D. All the options
Ans : All the options
Q.23 “No unauthorized disclosure” is an objective of which aspect of database security?
A. Accountability
B. Availability
C. Integrity
D. Confidentiality
Ans : Confidentiality