Database Security
Database Security
- DAM systems that are a hybrid between a true DAM system and a SIEM which relies on data
generated by the database are called ___________
LOG-BASED DAM SYSTEMS
- _______ provides means to monitor privileged users and application access independent of
native database logging and audit functions.
DATABASE ACTIVITY MONITORING (DAM)
- A high-level function that is responsible for the overall management of data resources in an
organization
DATA ADMINISTRATION
- Databases that are not connected to the internet are safe from attacks.
FALSE
- ________ is exploited by influencing SQL statements that do not filter input from applications
to a back-end database correctly.
SQL INJECTION
- _______ mechanisms ensure that information contained in objects does not flow explicitly or
implicitly into less protected objects.
FLOW CONTROL
- Which of the following option can be considered a target for SQL injection?
EXCESSIVE PRIVILEGES
- __________ identifies the database platforms within infrastructure and then examines their
risk exposure.
DATABASE RISK ASSESSMENT
- ______________ is used to enforce multilevel security by categorizing the data and users into
various security classes.
MANDATORY ACCESS CONTROL