NSCT – Database Security MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Database security refers to: (A) Protecting the database from unauthorized access, misuse, and threats (B) Compressing tables (C) Encrypting backups only (D) Deleting old recordsShow All AnswersShow All Answers 2. . The main goal of database security is to: (A) Compress tables (B) Ensure confidentiality, integrity, and availability of data (C) Encrypt tables only (D) Delete old records automaticallyShow All Answers 3. . Authentication in database security is: (A) Verifying the identity of users before granting access (B) Encrypting tables (C) Compressing data (D) Deleting old recordsShow All Answers 4. . Authorization in database security is: (A) Granting or denying permissions to access database objects (B) Encrypting tables (C) Compressing tables (D) Deleting old dataShow All Answers 5. . Access control in DBMS can be: (A) Compression only (B) Discretionary Access Control (DAC), Mandatory Access Control (MAC), or Role-Based Access Control (RBAC) (C) Encryption only (D) Backup onlyShow All Answers 6. . Discretionary Access Control (DAC) allows: (A) Only compression-based access (B) System-enforced access (C) Only encryption-based access (D) The owner of an object to grant/restrict accessShow All Answers 7. . Mandatory Access Control (MAC) is: (A) Backup protocol (B) Owner-defined access control (C) Compression method (D) System-enforced access control based on labels and security levelsShow All Answers 8. . Role-Based Access Control (RBAC) assigns permissions based on: (A) Encryption levels (B) Owner privileges only (C) Compression keys (D) Roles assigned to usersShow All Answers 9. . SQL injection is: (A) Backup method (B) Encryption technique (C) Compression technique (D) A security threat where malicious SQL code is inserted into queriesShow All Answers 10. . To prevent SQL injection, one should use: (A) Only encryption (B) Prepared statements, parameterized queries, and input validation (C) Only compression (D) Only backupShow All Answers 11. . Encryption in database security ensures: (A) Faster queries (B) Confidentiality of data by making it unreadable without a key (C) Backup of data (D) Compression of dataShow All Answers 12. . Data masking is used to: (A) Hide sensitive data while providing a usable substitute for testing or sharing (B) Encrypt tables only (C) Compress tables (D) Delete old recordsShow All Answers 13. . Auditing in DBMS involves: (A) Deleting old logs (B) Compressing tables (C) Encrypting backups (D) Tracking database access and operations for security and complianceShow All Answers 14. . Backup and recovery contribute to security by: (A) Encrypting data only (B) Ensuring availability and protection against data loss (C) Compressing data only (D) Deleting old recordsShow All Answers 15. . Database firewalls are used to: (A) Encrypt data (B) Compress data (C) Monitor and control database traffic to prevent attacks (D) Backup dataShow All Answers 16. . Principle of least privilege means: (A) Users are granted only the minimum permissions necessary to perform their tasks (B) Users get all privileges (C) Users get privileges randomly (D) Users cannot access any dataShow All Answers 17. . Physical database security includes: (A) Deleting old data (B) Encrypting tables (C) Compressing tables (D) Protecting hardware, storage devices, and servers from theft or damageShow All Answers 18. . Logical database security includes: (A) Protecting data from unauthorized access through authentication, authorization, and auditing (B) Compressing tables (C) Encrypting hardware (D) Physical security onlyShow All Answers 19. . Threats to database security include: (A) SQL injection, privilege abuse, malware, and data leakage (B) Compression errors only (C) Encryption failures only (D) Backup failures onlyShow All Answers 20. . The main goal of database security is to: (A) Encrypt backups only (B) Compress tables (C) Protect confidentiality, integrity, and availability of data from all threats (D) Delete old records automaticallyShow All Answers