NSCT – Database Security MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Database security refers to: (A) Protecting the database from unauthorized access, misuse, and threats (B) Compressing tables (C) Encrypting backups only (D) Deleting old recordsShow All Answers 2. . The main goal of database security is to: (A) Compress tables (B) Ensure confidentiality, integrity, and availability of data (C) Encrypt tables only (D) Delete old records automatically 3. . Authentication in database security is: (A) Verifying the identity of users before granting access (B) Encrypting tables (C) Compressing data (D) Deleting old records 4. . Authorization in database security is: (A) Granting or denying permissions to access database objects (B) Encrypting tables (C) Compressing tables (D) Deleting old data 5. . Access control in DBMS can be: (A) Compression only (B) Discretionary Access Control (DAC), Mandatory Access Control (MAC), or Role-Based Access Control (RBAC) (C) Encryption only (D) Backup only 6. . Discretionary Access Control (DAC) allows: (A) Only compression-based access (B) System-enforced access (C) Only encryption-based access (D) The owner of an object to grant/restrict access 7. . Mandatory Access Control (MAC) is: (A) Backup protocol (B) Owner-defined access control (C) Compression method (D) System-enforced access control based on labels and security levels 8. . Role-Based Access Control (RBAC) assigns permissions based on: (A) Encryption levels (B) Owner privileges only (C) Compression keys (D) Roles assigned to users 9. . SQL injection is: (A) Backup method (B) Encryption technique (C) Compression technique (D) A security threat where malicious SQL code is inserted into queries 10. . To prevent SQL injection, one should use: (A) Only encryption (B) Prepared statements, parameterized queries, and input validation (C) Only compression (D) Only backup 11. . Encryption in database security ensures: (A) Faster queries (B) Confidentiality of data by making it unreadable without a key (C) Backup of data (D) Compression of data 12. . Data masking is used to: (A) Hide sensitive data while providing a usable substitute for testing or sharing (B) Encrypt tables only (C) Compress tables (D) Delete old records 13. . Auditing in DBMS involves: (A) Deleting old logs (B) Compressing tables (C) Encrypting backups (D) Tracking database access and operations for security and compliance 14. . Backup and recovery contribute to security by: (A) Encrypting data only (B) Ensuring availability and protection against data loss (C) Compressing data only (D) Deleting old records 15. . Database firewalls are used to: (A) Encrypt data (B) Compress data (C) Monitor and control database traffic to prevent attacks (D) Backup data 16. . Principle of least privilege means: (A) Users are granted only the minimum permissions necessary to perform their tasks (B) Users get all privileges (C) Users get privileges randomly (D) Users cannot access any data 17. . Physical database security includes: (A) Deleting old data (B) Encrypting tables (C) Compressing tables (D) Protecting hardware, storage devices, and servers from theft or damage 18. . Logical database security includes: (A) Protecting data from unauthorized access through authentication, authorization, and auditing (B) Compressing tables (C) Encrypting hardware (D) Physical security only 19. . Threats to database security include: (A) SQL injection, privilege abuse, malware, and data leakage (B) Compression errors only (C) Encryption failures only (D) Backup failures only 20. . The main goal of database security is to: (A) Encrypt backups only (B) Compress tables (C) Protect confidentiality, integrity, and availability of data from all threats (D) Delete old records automatically