Database Security MCQ Quiz Questions And Answers

10 Questions | Total Attempts: 1934

SettingsSettingsSettings
Database Security MCQ Quiz Questions And Answers - Quiz

The security of the database is crucial. Do you know the nitty-gritty details about it? Our ' Database security MCQ quiz questions and answers ' will test your basic knowledge about the same topic. You are expected to answer all the given questions. Make sure to read the questions carefully before attempting. Can you get a high score? We challenge you to take this quiz and find out! All the very best and keep learning!


Questions and Answers
  • 1. 
    Which of the following does a database security solution not monitor?
    • A. 

      Database changes

    • B. 

      Sensitive data access

    • C. 

      Database complexity

    • D. 

      Security events

  • 2. 
    How does SecureSphere work with logs for auditing purposes?
    • A. 

      Scans logs for particular users who are known to be security risks

    • B. 

      Imperva SecureSphere does not rely on native database logs

    • C. 

      Analyzes the log to discover databases

    • D. 

      Analyzes the log to perform ongoing validation of user account settings

  • 3. 
    What does it mean for a user to access a database through a multi-tier infrastructure?
    • A. 

      The user accesses the database through web or application servers

    • B. 

      The user opens connections to multiple databases simultaneously

    • C. 

      Each user connection to the database is layered to improve performance

    • D. 

      Multiple levels of access to the database are available to the user

  • 4. 
    When SecureSphere identifies vulnerability, DBAs can use the Risk Management Workbench to:
    • A. 

      Review the vulnerabilities

    • B. 

      Manage the vulnerabilities

    • C. 

      Virtually patch the vulnerabilities

    • D. 

      All of the above

  • 5. 
    To enable enterprises to effectively manage user access rights, SecureSphere:
    • A. 

      Limits rights based on business need-to-know

    • B. 

      Prevents excessive user rights

    • C. 

      Disables dormant accounts

    • D. 

      All of the above

  • 6. 
    SecureSphere can be implemented either in­line or non-in­line.
    • A. 

      True

    • B. 

      False

  • 7. 
    Which of the following used an entity-relationship model?
    • A. 

      Database processing

    • B. 

       Database direction

    • C. 

      Database implementation

    • D. 

      Database design

  • 8. 
    What's the full form of CLR?
    • A. 

      Common Language Runtime

    • B. 

      Computing language Runtime

    • C. 

      Conditional language Runtime

    • D. 

      None of the above

  • 9. 
    ADA and COBOL are examples of what kind of programming language?
    • A. 

      Referential language

    • B. 

      Client language

    • C. 

      Host language

    • D. 

      None of thew above

  • 10. 
    A non-dense index is a type of what?
    • A. 

      Clustering index

    • B. 

      Primary index

    • C. 

       secondary index

    • D. 

      All of the above

Related Topics
Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.