Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

The DAM architecture in which the systems collect information regarding database activity by monitoring the communication between the database client

Answer»

The DAM architecture in which the SYSTEMS collect INFORMATION regarding database ACTIVITY by monitoring the communication between the database CLIENT and the database server is called ________.
Choose the correct option from below list
(1)Log-based architecture
(2)Memory-based architecture
(3)Network Architecture
(4)Interception-based architecture

Answer:-(4)Interception-based architecture

2.

An administrative function responsible for managing data quality and assuring that organizational applications meet the enterprise goals.

Answer»

An administrative function RESPONSIBLE for managing data QUALITY and assuring that organizational applications meet the enterprise goals.
Choose the correct option from below list
(1)Database Administration
(2)Database Steward
(3)Data Administration

Answer:-(1)Database Administration

3.

_________ ensures that all direct accesses to the system objects occur base on modes and rules fixed by protection policies.

Answer»

_________ ensures that all direct ACCESSES to the system objects occur base on modes and rules FIXED by protection policies.
Choose the correct option from below list
(1)Access control
(2)Database Monitoring
(3)Inference control
(4)Data Administration

Answer:-(1)Access control

4.

________ is exploited by influencing SQL statements that do not filter input from applications to a back-end database correctly.

Answer»

________ is exploited by influencing SQL STATEMENTS that do not filter INPUT from APPLICATIONS to a backend database correctly.
Choose the correct option from below list
(1)DoS Attacks
(2)Privilege issues
(3)Data LEAKS
(4)SQL Injection

Answer:-(4)SQL Injection

5.

Which of the following options are measures to secure backup data?

Answer»

Which of the following options are measures to secure backup data?
Choose the correct OPTION from below list
(1)All the options
(2)Implementing security STANDARDS
(3)Increasing security awareness
(4)Use of cyber security software
(5)Encryption

Answer:-(1)All the options

6.

__________ is achieved by distributing privileges for accomplishing a task to different people.

Answer»

__________ is achieved by distributing privileges for ACCOMPLISHING a task to different people.
Choose the correct option from below LIST
(1)PRINCIPLE of Least PRIVILEGE
(2)Privilege Escalation
(3)Separation of duties

Answer:-(3)Separation of duties

7.

Which of the following option can be considered a target for SQL injection?

Answer»

Which of the following OPTION can be considered a TARGET for SQL injection?
Choose the CORRECT option from below list
(1)Misconfigured Databases
(2)Excessive Privileges
(3)Network Connectivity
(4)Stored Procedures

Answer:-(4)Stored Procedures

8.

_______ mechanisms ensure that information contained in objects does not flow explicitly or implicitly into less protected objects.

Answer»

_______ mechanisms ensure that information contained in objects does not flow EXPLICITLY or IMPLICITLY into LESS protected objects.
Choose the correct option from below list
(1)Inference control
(2)ACCESS control
(3)Flow control

Answer:-(3)Flow control

9.

Which of the following options are consequences of user privilege misuse?

Answer»

Which of the following options are consequences of user PRIVILEGE misuse?
Choose the correct option from below LIST
(1)Unauthorized access
(2)Falsifies alert INVESTIGATION
(3)Data MANIPULATION
(4)All the options

Answer:-(4)All the options

10.

The technical aspects of data are handled by ____________

Answer»

The technical aspects of data are HANDLED by ____________
Choose the correct option from below list
(1)Data ADMINISTRATOR
(2)Database Administrator
(3)Database Steward

Answer:-(2)Database Administrator

11.

DAM architecture in which a lightweight sensor is attached to the protected databases and continuously polls the system global area (SGA) to collect S

Answer»

DAM ARCHITECTURE in which a LIGHTWEIGHT sensor is attached to the protected databases and continuously polls the system global area (SGA) to collect SQL statements.
Choose the appropriate option that closely matches the GIVEN statement.
(1)Log-based architecture
(2)Memory-based architecture
(3)Interception-based architecture
(4)Network Architecture

Answer:-(2)Memory-based architecture

12.

_______ mechanisms are used to protect data from indirect detections.

Answer»

_______ MECHANISMS are used to protect DATA from indirect detections.
Choose the CORRECT option from below list
(1)INFERENCE control
(2)Cryptography
(3)Access control
(4)Data Masking

Answer:-(1)Inference control

13.

____________ allows for the use of certain operations on database objects as authorized by another user.

Answer»

____________ allows for the use of certain OPERATIONS on DATABASE OBJECTS as authorized by another user.
Choose the correct option from below list
(1)System privileges
(2)Object Privileges
(3)ADMIN privileges

Answer:-(2)Object Privileges

14.

The process in which the application aggregates all user traffic within a few database connections that are identified only by a generic service accou

Answer»

The process in which the application aggregates all user traffic within a few DATABASE connections that are identified only by a GENERIC service account name is called _______________.
Choose the correct OPTION from below list
(1)Identity Pooling
(2)Connection Pooling
(3)Identity Masking
(4)DATA Masking

Answer:-(2)Connection Pooling

15.

Which of the following options are principal classes of DoS attacks?

Answer»

Which of the FOLLOWING OPTIONS are principal classes of DoS attacks?
Choose the correct option from below LIST
(1)COMPLEX Queries
(2)Application usage
(3)ABUSE of functions
(4)Bugs in database
(5)All the applications

Answer:-(5)All the applications

16.

Testing before deployment is not an essential step to ensure database security.

Answer»

Testing before deployment is not an essential STEP to ensure database security.
Choose the CORRECT OPTION from below LIST
(1)False
(2)True

Answer:-(1)False

17.

DAM systems that are a hybrid between a true DAM system and a SIEM which relies on data generated by the database are called ___________.

Answer»

DAM systems that are a hybrid between a TRUE DAM system and a SIEM which relies on data generated by the database are called ___________.
CHOOSE the correct option from below list
(1)Interception-based DAM Systems
(2)Log-based DAM Systems
(3)Memory-based DAM Systems

Answer:-(2)Log-based DAM Systems

18.

________ is an attack on a network or computer to make that computer or network unavailable to a legitimate user.

Answer»

________ is an attack on a network or computer to make that computer or network unavailable to a LEGITIMATE user.
Choose the CORRECT option from below list
(1)SQL injection attacks
(2)Malware attacks
(3)DOS attacks
(4)Zero day attacks

Answer:-(3)DoS attacks

19.

A method of creating a structurally similar but inauthentic version of an organization's data is most commonly known as

Answer»

A method of creating a STRUCTURALLY SIMILAR but inauthentic version of an organization's data is most commonly known as
Choose the correct option from below list
(1)Data replication
(2)CRYPTOGRAPHY
(3)Data Masking
(4)Obfuscation

Answer:-(3)Data Masking

20.

________aims to replace sensitive data in transit leaving the original at-rest data intact and unaltered.

Answer»

________aims to replace sensitive DATA in transit LEAVING the original at-rest data INTACT and unaltered.
Choose the correct option from below list
(1)Static Data MASKING
(2)Dynamic Data Masking

Answer:-(2)Dynamic Data Masking

21.

No unauthorized disclosure is an objective of which aspect of database security?

Answer»

No unauthorized disclosure is an objective of which aspect of database security?
CHOOSE the correct option from below LIST
(1)Accountability
(2)Integrity
(3)Availability
(4)CONFIDENTIALITY

Answer:-(4)Confidentiality

22.

No unauthorized modification is an objective of which aspect of database security?

Answer»

No unauthorized modification is an objective of which aspect of database security?
Choose the CORRECT OPTION from below list
(1)INTEGRITY
(2)ACCOUNTABILITY
(3)Availability
(4)Confidentiality

Answer:-(1)Integrity

23.

In information security, CIA stands for _____________.

Answer»

In information SECURITY, CIA STANDS for _____________.
Choose the correct option from below list
(1)Confidentiality INTEGRITY Availability
(2)Confidentiality Integrity ACCOUNTABILITY
(3)Confidentiality Integrity Authenticity

Answer:-(1)Confidentiality Integrity Availability

24.

Which of the following option signifies the importance of database security?

Answer»

Which of the FOLLOWING option signifies the importance of database security?
CHOOSE the correct option from below list
(1)Prevents cyber attacks
(2)All the options
(3)Prevents data loss
(4)Helps keep sensitive INFORMATION safe
(5)Increases reliability

Answer:-(2)All the options

25.

Databases that are not connected to the internet are safe from attacks.

Answer» DATABASES that are not connected to the internet are SAFE from attacks.
Choose the CORRECT option from below list
(1)FALSE
(2)True

Answer:-(1)False
26.

Audit Trails help prevent attacks against databases.

Answer»

Audit Trails HELP prevent ATTACKS against databases.
Choose the correct option from below LIST
(1)TRUE
(2)False

Answer:-(2)False

27.

________ determines the resources a user can access and the actions the user can perform on those resources.

Answer»

________ determines the resources a user can access and the actions the user can perform on those resources.
Choose the correct option from below LIST
(1)Data ADMINISTRATION
(2)User privileges
(3)Authentication
(4)Authorization

Answer:-(2)User privileges

28.

A high-level function that is responsible for the overall management of data resources in an organization

Answer»

A high level FUNCTION that is responsible for the overall management of data RESOURCES in an organization
Choose the correct OPTION from below list
(1)Data ADMINISTRATION
(2)Database Administration
(3)Database Steward

Answer:-(1)Data Administration

29.

_______ privileges allow a user to perform administrative operations in a database.

Answer»

_______ privileges allow a user to perform administrative operations in a database.
Choose the CORRECT OPTION from below list
(1)Admin
(2)Object
(3)Data
(4)System

Answer:-(4)System