T4Tutorials .PK

NSCT – Database Security MCQs

1. . Database security refers to:

(A) Protecting the database from unauthorized access, misuse, and threats


(B) Compressing tables


(C) Encrypting backups only


(D) Deleting old records




2. . The main goal of database security is to:

(A) Compress tables


(B) Ensure confidentiality, integrity, and availability of data


(C) Encrypt tables only


(D) Delete old records automatically




3. . Authentication in database security is:

(A) Verifying the identity of users before granting access


(B) Encrypting tables


(C) Compressing data


(D) Deleting old records




4. . Authorization in database security is:

(A) Granting or denying permissions to access database objects


(B) Encrypting tables


(C) Compressing tables


(D) Deleting old data




5. . Access control in DBMS can be:

(A) Compression only


(B) Discretionary Access Control (DAC), Mandatory Access Control (MAC), or Role-Based Access Control (RBAC)


(C) Encryption only


(D) Backup only




6. . Discretionary Access Control (DAC) allows:

(A) Only compression-based access


(B) System-enforced access


(C) Only encryption-based access


(D) The owner of an object to grant/restrict access




7. . Mandatory Access Control (MAC) is:

(A) Backup protocol


(B) Owner-defined access control


(C) Compression method


(D) System-enforced access control based on labels and security levels




8. . Role-Based Access Control (RBAC) assigns permissions based on:

(A) Encryption levels


(B) Owner privileges only


(C) Compression keys


(D) Roles assigned to users




9. . SQL injection is:

(A) Backup method


(B) Encryption technique


(C) Compression technique


(D) A security threat where malicious SQL code is inserted into queries




10. . To prevent SQL injection, one should use:

(A) Only encryption


(B) Prepared statements, parameterized queries, and input validation


(C) Only compression


(D) Only backup




11. . Encryption in database security ensures:

(A) Faster queries


(B) Confidentiality of data by making it unreadable without a key


(C) Backup of data


(D) Compression of data




12. . Data masking is used to:

(A) Hide sensitive data while providing a usable substitute for testing or sharing


(B) Encrypt tables only


(C) Compress tables


(D) Delete old records




13. . Auditing in DBMS involves:

(A) Deleting old logs


(B) Compressing tables


(C) Encrypting backups


(D) Tracking database access and operations for security and compliance




14. . Backup and recovery contribute to security by:

(A) Encrypting data only


(B) Ensuring availability and protection against data loss


(C) Compressing data only


(D) Deleting old records




15. . Database firewalls are used to:

(A) Encrypt data


(B) Compress data


(C) Monitor and control database traffic to prevent attacks


(D) Backup data




16. . Principle of least privilege means:

(A) Users are granted only the minimum permissions necessary to perform their tasks


(B) Users get all privileges


(C) Users get privileges randomly


(D) Users cannot access any data




17. . Physical database security includes:

(A) Deleting old data


(B) Encrypting tables


(C) Compressing tables


(D) Protecting hardware, storage devices, and servers from theft or damage




18. . Logical database security includes:

(A) Protecting data from unauthorized access through authentication, authorization, and auditing


(B) Compressing tables


(C) Encrypting hardware


(D) Physical security only




19. . Threats to database security include:

(A) SQL injection, privilege abuse, malware, and data leakage


(B) Compression errors only


(C) Encryption failures only


(D) Backup failures only




20. . The main goal of database security is to:

(A) Encrypt backups only


(B) Compress tables


(C) Protect confidentiality, integrity, and availability of data from all threats


(D) Delete old records automatically




Exit mobile version