database sec

QUESTION 1

  1. A(n) _____________ is a shared database schema containing data that belongs to many different users, and each user can view or update only the data he or she owns.


10 points

QUESTION 2

  1. True or False: SQL Server does not support the VPD function.





10 points

QUESTION 3

  1. The ____________________ user is the application schema owner that owns all tables and the tables’ policies.
    VPD_CLERK2
    VPD_CLERK1
    Customers
    DBSEC

10 points

QUESTION 4

  1. The ____________________ control column contains the name of the user who inserted the row and is allowed to update it.
    CTL_CLERK_USER
    SALES_REP_ID
    CTL_UPD_USER
    CTL_REC_STAT

10 points

QUESTION 5

  1. Using _______________, which is an Oracle-supplied package, add the VPD policy used to enforce VPDs: RLS (row-level security).


10 points

QUESTION 6

    1. What is a shared database schema? What are the benefits and purpose?

    Path: pWords:0

10 points

QUESTION 7

  1. VPDs are also referred to as or .

10 points

QUESTION 8

  1. True or False: You can use the capability to restrict updates or inserts on columns, using GRANT_UPDATE(column) and INSERT(column)





10 points

QUESTION 9

  1. A _____________ is a security concept that describes the limitation of database resources that are granted database users.
    role
    privilege
    profile
    password

10 points

QUESTION 10

  1. In Oracle, to view all profiles created in the database, query the data dictionary view with: __________________.
    DB_PROFILES
    DBA_PROFILES
    SYS_PROFILES
    DBMS_PROFILES

10 points

QUESTION 11

  1. A(n) _____________________________ is a set of guidelines that enhances the robustness of a password and reduces the robustness of a password and reduces the likelihood of its being broken.


10 points

QUESTION 12

  1. In Oracle you can grant a privilege by using the data control language (DCL) ____________________ statement.


10 points

QUESTION 13

  1. A _____________________________ is a concept used to organize and administer privileges in an easy manner.
    role
    privilege
    password policy
    profile

10 points

QUESTION 14

  1. In order for encryption to be effective you must have:
    data masking
    backup and recovery procedures
    centralized key management
    none of the above.

10 points

QUESTION 15

  1. True or False: When encrypted data needs to be destroyed or disposed of then destroying the keys will not prevent the data ever being read.





10 points

QUESTION 16

  1. When using the single key encryption approach which is NOT true?
    There is only one key to manage to create, access, and back up.
    The key can be placed in many places convenient for the application to access.
    If the key is ever stolen, the entire database is not vulnerable.
    None of the above.

10 points

QUESTION 17

  1. A ____________________ is a method to permit or deny access to data or to perform a database operation.
    role
    profile
    password policy
    privilege

10 points

QUESTION 18

  1. A(n) _____________ is a collection of related data files used by an application.
    application
    database
    DBMS
    Database management system

10 points

QUESTION 19

  1. A(n) __________________ is simply a record created for a user within the application schema to be used for authentication to the application.
    application user
    database user
    proxy user
    schema user

10 points

QUESTION 20

  1. ____________________ is a process that decides whether users are permitted to perform the functions they request.
    Identification
    Authentication
    Authorization
    Verification
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!

Order Now Just Browsing

All of our assignments are originally produced, unique, and free of plagiarism.

Free Revisions Plagiarism Free 24x7 Support