InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The DAM architecture in which the systems collect information regarding database activity by monitoring the communication between the database client |
|
Answer» The DAM architecture in which the SYSTEMS collect INFORMATION regarding database ACTIVITY by monitoring the communication between the database CLIENT and the database server is called ________. |
|
| 2. |
An administrative function responsible for managing data quality and assuring that organizational applications meet the enterprise goals. |
|
Answer» An administrative function RESPONSIBLE for managing data QUALITY and assuring that organizational applications meet the enterprise goals. |
|
| 3. |
_________ ensures that all direct accesses to the system objects occur base on modes and rules fixed by protection policies. |
|
Answer» _________ ensures that all direct ACCESSES to the system objects occur base on modes and rules FIXED by protection policies. |
|
| 4. |
________ is exploited by influencing SQL statements that do not filter input from applications to a back-end database correctly. |
|
Answer» ________ is exploited by influencing SQL STATEMENTS that do not filter INPUT from APPLICATIONS to a backend database correctly. |
|
| 5. |
Which of the following options are measures to secure backup data? |
|
Answer» Which of the following options are measures to secure backup data? |
|
| 6. |
__________ is achieved by distributing privileges for accomplishing a task to different people. |
|
Answer» __________ is achieved by distributing privileges for ACCOMPLISHING a task to different people. |
|
| 7. |
Which of the following option can be considered a target for SQL injection? |
|
Answer» Which of the following OPTION can be considered a TARGET for SQL injection? |
|
| 8. |
_______ mechanisms ensure that information contained in objects does not flow explicitly or implicitly into less protected objects. |
|
Answer» _______ mechanisms ensure that information contained in objects does not flow EXPLICITLY or IMPLICITLY into LESS protected objects. |
|
| 9. |
Which of the following options are consequences of user privilege misuse? |
|
Answer» Which of the following options are consequences of user PRIVILEGE misuse? |
|
| 10. |
The technical aspects of data are handled by ____________ |
|
Answer» The technical aspects of data are HANDLED by ____________ |
|
| 11. |
DAM architecture in which a lightweight sensor is attached to the protected databases and continuously polls the system global area (SGA) to collect S |
|
Answer» DAM ARCHITECTURE in which a LIGHTWEIGHT sensor is attached to the protected databases and continuously polls the system global area (SGA) to collect SQL statements. |
|
| 12. |
_______ mechanisms are used to protect data from indirect detections. |
|
Answer» _______ MECHANISMS are used to protect DATA from indirect detections. |
|
| 13. |
____________ allows for the use of certain operations on database objects as authorized by another user. |
|
Answer» ____________ allows for the use of certain OPERATIONS on DATABASE OBJECTS as authorized by another user. |
|
| 14. |
The process in which the application aggregates all user traffic within a few database connections that are identified only by a generic service accou |
|
Answer» The process in which the application aggregates all user traffic within a few DATABASE connections that are identified only by a GENERIC service account name is called _______________. |
|
| 15. |
Which of the following options are principal classes of DoS attacks? |
|
Answer» Which of the FOLLOWING OPTIONS are principal classes of DoS attacks? |
|
| 16. |
Testing before deployment is not an essential step to ensure database security. |
|
Answer» Testing before deployment is not an essential STEP to ensure database security. |
|
| 17. |
DAM systems that are a hybrid between a true DAM system and a SIEM which relies on data generated by the database are called ___________. |
|
Answer» DAM systems that are a hybrid between a TRUE DAM system and a SIEM which relies on data generated by the database are called ___________. |
|
| 18. |
________ is an attack on a network or computer to make that computer or network unavailable to a legitimate user. |
|
Answer» ________ is an attack on a network or computer to make that computer or network unavailable to a LEGITIMATE user. |
|
| 19. |
A method of creating a structurally similar but inauthentic version of an organization's data is most commonly known as |
|
Answer» A method of creating a STRUCTURALLY SIMILAR but inauthentic version of an organization's data is most commonly known as |
|
| 20. |
________aims to replace sensitive data in transit leaving the original at-rest data intact and unaltered. |
|
Answer» ________aims to replace sensitive DATA in transit LEAVING the original at-rest data INTACT and unaltered. |
|
| 21. |
No unauthorized disclosure is an objective of which aspect of database security? |
|
Answer» No unauthorized disclosure is an objective of which aspect of database security? |
|
| 22. |
No unauthorized modification is an objective of which aspect of database security? |
|
Answer» No unauthorized modification is an objective of which aspect of database security? |
|
| 23. |
In information security, CIA stands for _____________. |
|
Answer» In information SECURITY, CIA STANDS for _____________. |
|
| 24. |
Which of the following option signifies the importance of database security? |
|
Answer» Which of the FOLLOWING option signifies the importance of database security? |
|
| 25. |
Databases that are not connected to the internet are safe from attacks. |
|
Answer» DATABASES that are not connected to the internet are SAFE from attacks. Choose the CORRECT option from below list (1)FALSE (2)True Answer:-(1)False |
|
| 26. |
Audit Trails help prevent attacks against databases. |
|
Answer» Audit Trails HELP prevent ATTACKS against databases. |
|
| 27. |
________ determines the resources a user can access and the actions the user can perform on those resources. |
|
Answer» ________ determines the resources a user can access and the actions the user can perform on those resources. |
|
| 28. |
A high-level function that is responsible for the overall management of data resources in an organization |
|
Answer» A high level FUNCTION that is responsible for the overall management of data RESOURCES in an organization |
|