50% found this document useful (2 votes)
16K views

Database Security

Database security is important to ensure confidentiality, integrity, and availability of data. Various threats like denial of service attacks, SQL injection, and privilege misuse can compromise database security. Effective database security requires measures like access control, encryption, activity monitoring, testing before deployment, and regular risk assessments.

Uploaded by

Cachues Profile
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
16K views

Database Security

Database security is important to ensure confidentiality, integrity, and availability of data. Various threats like denial of service attacks, SQL injection, and privilege misuse can compromise database security. Effective database security requires measures like access control, encryption, activity monitoring, testing before deployment, and regular risk assessments.

Uploaded by

Cachues Profile
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

DIGITAL SECURITY > DATABASE SECURITY

- Which of the following option signifies the importance of database security?


ALL THE OPTIONS

- _______ privileges allow a user to perform administrative operations in a database.


ADMIN

- ________ is an attack on a network or computer to make that computer or network unavailable


to a legitimate user.
DoS ATTACKS

- Testing before deployment is not an essential step to ensure database security.


FALSE

- In information security, CIA stands for ________


CONFIDENTIALITY INTEGRITY AVAILABILITY

- DAM systems that are a hybrid between a true DAM system and a SIEM which relies on data
generated by the database are called ___________
LOG-BASED DAM SYSTEMS

- _______ provides means to monitor privileged users and application access independent of
native database logging and audit functions.
DATABASE ACTIVITY MONITORING (DAM)

- “No unauthorized disclosure” is an objective of which aspect of database security?


CONFIDENTIALITY

- A high-level function that is responsible for the overall management of data resources in an
organization
DATA ADMINISTRATION

- “No unauthorized modification” is an objective of which aspect of database security?


INTEGRITY

- The technical aspects of data are handled by ___


DATA ADMINISTRATOR

- Which of the following options are principal classes of DoS attacks?


ALL THE APPLICATIONS

- A method of creating a structurally similar but inauthentic version of an organization's data is


most commonly known as:
DATA MASKING

- _______ mechanisms are used to protect data from indirect detections.


CRYPTOGRAPHY

- Databases that are not connected to the internet are safe from attacks.
FALSE

- ________ is exploited by influencing SQL statements that do not filter input from applications
to a back-end database correctly.
SQL INJECTION

- __________ is achieved by distributing privileges for accomplishing a task to different people.


PRINCIPLE OF LEAST PRIVILEGE

- _______ mechanisms ensure that information contained in objects does not flow explicitly or
implicitly into less protected objects.
FLOW CONTROL

- Which of the following option can be considered a target for SQL injection?
EXCESSIVE PRIVILEGES

- Cryptography ensures ____________________


CONFIDENTIALITY AND INTEGRITY

- __________ identifies the database platforms within infrastructure and then examines their
risk exposure.
DATABASE RISK ASSESSMENT

- Which of the following options are consequences of user privilege misuse?


ALL THE OPTIONS

- ______________ is used to enforce multilevel security by categorizing the data and users into
various security classes.
MANDATORY ACCESS CONTROL

You might also like