You are on page 1of 1

Group 10 I.T.

Quiz (3-11)
1. The DBMSs security subsystem is also known as
a. authentication subsystem
b. authorization subsystem
c. integrity subsystem
d. protection subsystem
2. It is any intentional or accidental event that may
adversely affect the system.
a. Threat
b. Virus

c. Fraud
d. Audit Trail

11. Which of the following statement is FALSE?


I.
Class A provides a discretionary protection
II.
Class B provides a verified protection
III.
Class C provides a mandatory protection
IV.
Class D provides a minimal protection

3. Which of the following, who did not invented public


key encryption?

a. I,II,III
b. II,III,IV

a. Ralph Merkle
c. Martin Edward Hellman
Diffie

12. A mechanism that determines whether a user is


who he/she claims to be.

b .Mitsuru Matsui
d. Whitfield

4. It is a database that contains a lot of individually


sensitive items of information.
a. Data Encryption
Database
b. Statistical Database

c. Discretionary
d. Cascade Database

5. The mechanism that protect the database against


intentional or accidental threats.
a. Integrity
b. Database Log

c. Password
d. Security

6. A database log that is used mainly for security


purposes.
a. Security Constraint
b. Mandatory Access Control

c. Clearance Level
d. Audit Trails

7. A set of security requirements for any Trusted


Computing Base
a. Orange book
b. Lavender book

c. Red book
d. Blue book

8. Characterized by a high degree of flexibility, which


makes them suitable for a large variety of application
domains.

c. I,III,IV
d. All of the above

a. Context-dependent authority c. Authentication


b. Audit Trails
d. Authorization
13. Storing and transmitting sensitive data in
encrypted form.
a. Date Encryption
b. Substitution

c. Permutation
d. SQL Facilities

14. It is given by your computer to any computer that


wants to communicate securely with it.
a. Public Key
b. Key

c. Encryption Key
d. Private Key

15. Which can be used to hide sensitive data from


unauthorized users.
a. SQL Facilities
Encryption
b. Authorization Subsystem

c. Asymmetric
d. View Mechanism

16. It defines an interpretation of the TCB


requirements for database systems specifically.
a. Orange Book
b. Lavender Book
Security

c. Security
d. Multi-level

17. It is the output from algorithm.


a. Individual tracker
Access Control
b. Discretionary Access Control

c. Mandatory
d. Verified Protection

9. APPEND and REPLACE are the QUEL analogs of what


privilege?
a.Select and Update
c.Delete and Update

b.Select and Insert


d.Insert and Update

10. Each data is labeled with a certain classification


level, and each user is given a certain clearance level
a. Discretionary Control
b. Individual Tracker

c. Mandatory Control
d. General Tracker

a. Data Encryption
b. Integrity
Standard

c. Cipher text
d. Data Encryption

18. It is a block cipher that uses shared secret


encryption.
a. Asymmetric-key Encryption c. Encryption Algorithm
b. Cipher text
d. Data Encryption
Standard

19. Ensure a high degree of protection in a way; they


prevent any illegal flow of information.
a. Mandatory Access Control
b. Encryption Key
value

c. Clearance Level
d. TERMINAL()-

20. Maintaining a secure database system by


preventing data from becoming invalid.
a. Integrity
b. Security

c. Password
d. Mandatory Control

You might also like