Database Security

6 Questions | Total Attempts: 739

SettingsSettingsSettings
Please wait...
Database Quizzes & Trivia

Related Topics
Questions and Answers
  • 1. 
    Which of the following does a database security solution not monitor?
    • A. 

      Database changes

    • B. 

      Sensitive data access

    • C. 

      Database complexity

    • D. 

      Security events

  • 2. 
    How does SecureSphere work with logs for auditing purposes?
    • A. 

      Scans logs for particular users who are known to be security risks

    • B. 

      Imperva SecureSphere does not rely on native database logs

    • C. 

      Analyzes the log to discover databases

    • D. 

      Analyzes the log to perform ongoing validation of user account settings

  • 3. 
    • A. 

      The user accesses the database through web or application servers

    • B. 

      The user opens connections to multiple databases simultaneously

    • C. 

      Each user connection to the database is layered to improve performance

    • D. 

      Multiple levels of access to the database are available to the user

  • 4. 
    When SecureSphere identifies vulnerability, DBAs can use the Risk Management Workbench to:
    • A. 

      Review the vulnerabilities

    • B. 

      Manage the vulnerabilities

    • C. 

      Virtually patch the vulnerabilities

    • D. 

      All of the above

  • 5. 
    To enable enterprises to effectively manage user access rights, SecureSphere:
    • A. 

      Limits rights based on business need-to-know

    • B. 

      Prevents excessive user rights

    • C. 

      Disables dormant accounts

    • D. 

      All of the above

  • 6. 
    SecureSphere can be implemented either in­line or non-in­line.
    • A. 

      True

    • B. 

      False