0% found this document useful (0 votes)
1 views

Module 5

The document outlines an end-semester examination for Centurion University of Technology and Management, focusing on database systems and security. It includes questions categorized by two-mark, five-mark, and twelve-mark formats, addressing various aspects of database system backup, security vulnerabilities, and cluster deployment. Each question is linked to specific course outcomes (COs) to assess students' understanding and application of the subject matter.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Module 5

The document outlines an end-semester examination for Centurion University of Technology and Management, focusing on database systems and security. It includes questions categorized by two-mark, five-mark, and twelve-mark formats, addressing various aspects of database system backup, security vulnerabilities, and cluster deployment. Each question is linked to specific course outcomes (COs) to assess students' understanding and application of the subject matter.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CENTURION UNIVERSITY OF TECHNOLOGY AND MANAGEMENT

ANDHRA PRADESH

END SEMESTER – 2023

SUBJECT NAME:

SUBJECT CODE:

SEMESTER:

Question WRT TWO MARK QUESTIONS WITH SPECIFIC 10 10


COs
No

1 (CO1) What is the purpose of implementing 2


database system backup?

2 (CO2) Why is it important to create roles and 2


functions for database users in terms ofsecurity?

3 (CO1) Explain how the concepts of construction 2


of clusters relate to database system backup
implementation.

4 (CO3) How can developing new techniques in 2


cluster deployment benefit from knowledge of
database system backup?

5 (CO2) Discuss the importance of addressing 2


different security issues in database clusters.

6 (CO1) Why should database system backup be a 2


part of cluster construction concepts?

1
7 (CO3) How does understanding database system 2
security enhance cluster deployment skills?

8 (CO2) Explain the significance of solving 2


problems related to database cluster securities.

9 (CO1) Define the term "Database System 2


Backup."

10 (CO3) How can the knowledge of database 2


system backup contribute to real-world cluster
deployment?

Question WRT FIVE MARK QUESTIONS WITH SPECIFIC 10 10


COs
No

1 (CO1) Describe two methods for implementing 5


database system backup.

2 (CO2) Discuss two common security vulnerabilities in 5


database clusters and propose solutions for each.

2
3 (CO1) How does understanding database system 5
backup concepts support the construction of resilient
clusters?

4 (CO3) Describe two best practices for integrating 5


database system backup into cluster deployment
processes.

5 (CO2) Explain the role of encryption in database 5


cluster security and its impact on backup procedures.

6 (CO1) Discuss two factors to consider when selecting 5


backup storage solutions for database clusters.

7 (CO2) Compare and contrast role-based and rule 5


based access control in database cluster security.

8 (CO1) How do database system backup strategies 5


contribute to the overall reliability of clusters?

9 (CO3) Explain two techniques for enhancing database 5


system security in real-world cluster deployments.

10 (CO3) Describe two challenges in cluster deployment 5


related to database system backup and security.

3
Question WRT 12 MARK QUESTIONS WITH SPECIFIC COs 10 10

No

1 (CO1) Explain two techniques for restoring database backups in a 12


clustered environment.

2 (CO3) Discuss two ways in which database system backup 12


procedures can be optimized for efficient cluster deployment.

3 (CO1) How can understanding database system backup principles 12


enhance the scalability of clusters?

4 (CO3) Propose two innovative approaches to integrating database 12


system backup into cluster deployment automation.

5 (CO2) Explain the concept of least privilege and its importance in 12


database cluster security.

6 (CO1) Describe two types of database system backup methods and 12


their advantages in cluster construction.

7 (CO2) Evaluate the effectiveness of database auditing in enhancing 12


security for clustered environments.

4
8 (CO1) How does the implementation of database system backup 12
contribute to disaster recovery planning in cluster deployment?

9 (CO3) Describe two strategies for implementing role-based access 12


control in database clusters.

10 (CO2) Analyze two common threats to database cluster security and 12


propose preventive measures for each.

You might also like