1. . Database security refers to:
(A) Protecting the database from unauthorized access, misuse, and threats
(B) Compressing tables
(C) Encrypting backups only
(D) Deleting old records
2. . The main goal of database security is to:
(A) Compress tables
(B) Ensure confidentiality, integrity, and availability of data
(C) Encrypt tables only
(D) Delete old records automatically
3. . Authentication in database security is:
(A) Verifying the identity of users before granting access
(B) Encrypting tables
(C) Compressing data
(D) Deleting old records
4. . Authorization in database security is:
(A) Granting or denying permissions to access database objects
(B) Encrypting tables
(C) Compressing tables
(D) Deleting old data
5. . Access control in DBMS can be:
(A) Compression only
(B) Discretionary Access Control (DAC), Mandatory Access Control (MAC), or Role-Based Access Control (RBAC)
(C) Encryption only
(D) Backup only
6. . Discretionary Access Control (DAC) allows:
(A) Only compression-based access
(B) System-enforced access
(C) Only encryption-based access
(D) The owner of an object to grant/restrict access
7. . Mandatory Access Control (MAC) is:
(A) Backup protocol
(B) Owner-defined access control
(C) Compression method
(D) System-enforced access control based on labels and security levels
8. . Role-Based Access Control (RBAC) assigns permissions based on:
(A) Encryption levels
(B) Owner privileges only
(C) Compression keys
(D) Roles assigned to users
9. . SQL injection is:
(A) Backup method
(B) Encryption technique
(C) Compression technique
(D) A security threat where malicious SQL code is inserted into queries
10. . To prevent SQL injection, one should use:
(A) Only encryption
(B) Prepared statements, parameterized queries, and input validation
(C) Only compression
(D) Only backup
11. . Encryption in database security ensures:
(A) Faster queries
(B) Confidentiality of data by making it unreadable without a key
(C) Backup of data
(D) Compression of data
12. . Data masking is used to:
(A) Hide sensitive data while providing a usable substitute for testing or sharing
(B) Encrypt tables only
(C) Compress tables
(D) Delete old records
13. . Auditing in DBMS involves:
(A) Deleting old logs
(B) Compressing tables
(C) Encrypting backups
(D) Tracking database access and operations for security and compliance
14. . Backup and recovery contribute to security by:
(A) Encrypting data only
(B) Ensuring availability and protection against data loss
(C) Compressing data only
(D) Deleting old records
15. . Database firewalls are used to:
(A) Encrypt data
(B) Compress data
(C) Monitor and control database traffic to prevent attacks
(D) Backup data
16. . Principle of least privilege means:
(A) Users are granted only the minimum permissions necessary to perform their tasks
(B) Users get all privileges
(C) Users get privileges randomly
(D) Users cannot access any data
17. . Physical database security includes:
(A) Deleting old data
(B) Encrypting tables
(C) Compressing tables
(D) Protecting hardware, storage devices, and servers from theft or damage
18. . Logical database security includes:
(A) Protecting data from unauthorized access through authentication, authorization, and auditing
(B) Compressing tables
(C) Encrypting hardware
(D) Physical security only
19. . Threats to database security include:
(A) SQL injection, privilege abuse, malware, and data leakage
(B) Compression errors only
(C) Encryption failures only
(D) Backup failures only
20. . The main goal of database security is to:
(A) Encrypt backups only
(B) Compress tables
(C) Protect confidentiality, integrity, and availability of data from all threats
(D) Delete old records automatically