Access Control Models and Mechanisms Quiz
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

RBAC stands for

  • Role-Based Access Control (correct)
  • Responsibility-Based Access Control
  • Rule-Based Access Control
  • Random-Based Access Control
  • Encryption is often described as

  • The only line of defense
  • The last line of defense (correct)
  • The first line of defense
  • The weakest line of defense
  • Symmetric key encryption requires

  • A key generated for each message
  • The same encryption and decryption keys (correct)
  • A public and private key
  • Different encryption and decryption keys
  • Public key encryption involves

    <p>Publishing the encryption key for anyone to use</p> Signup and view all the answers

    The ARIES recovery algorithm is designed to work with

    <p>A steal and no-force approach</p> Signup and view all the answers

    Database auditing is used to

    <p>Prevent unauthorized access</p> Signup and view all the answers

    The three main principles of the ARIES recovery algorithm include all of the following except

    <p>Crash recovery after a crash</p> Signup and view all the answers

    Which type of log record is appended after modifying a page?

    <p>Update</p> Signup and view all the answers

    What is the purpose of a commit type log record?

    <p>To force-write the log tail to stable storage</p> Signup and view all the answers

    What type of log record is appended when a transaction is aborted?

    <p>Abort</p> Signup and view all the answers

    What additional action is taken when a transaction is aborted or committed?

    <p>A master record is written</p> Signup and view all the answers

    What is the purpose of a compensation log record (CLR)?

    <p>To undo the action described by an update log record</p> Signup and view all the answers

    What is the purpose of a checkpoint in a DBMS?

    <p>All of the above</p> Signup and view all the answers

    Which step marks the beginning of a checkpoint?

    <p>Begin_checkpoint</p> Signup and view all the answers

    Which table in a DBMS stores the lastLSN and status of transactions?

    <p>Xact Table</p> Signup and view all the answers

    Where is the master record written in a DBMS?

    <p>RAM</p> Signup and view all the answers

    Which of the following best describes a clustered index?

    <p>A clustered index is an index where the order of data records is the same as the order of data entries.</p> Signup and view all the answers

    What is the purpose of database security?

    <p>To ensure that data is kept safe from corruption and access to it is suitably controlled.</p> Signup and view all the answers

    Which of the following statements is true about dense indexes?

    <p>A dense index has at least one data entry per search key value.</p> Signup and view all the answers

    Which of the following is a risk associated with database security?

    <p>Unintended activity or misuse by authorized database users.</p> Signup and view all the answers

    What is the purpose of access control in database security?

    <p>To selectively restrict access to a place or resource.</p> Signup and view all the answers

    Which of the following factors can be used for authenticating information?

    <p>Something the user knows, something the user has, something the user is.</p> Signup and view all the answers

    Which access control model allows the policy designer to define a security policy independently of the implementation?

    <p>Organization-Based Access Control (OrBAC)</p> Signup and view all the answers

    What is the difference between a search key and a key?

    <p>A search key is any subset of the fields of a relation, while a key is a minimal set of fields that uniquely identify a record</p> Signup and view all the answers

    Which of the following is true about an index on a file?

    <p>It supports efficient retrieval of all data entries with a given key value</p> Signup and view all the answers

    Which of the following is true about the alternatives for data entries in an index?

    <p>Alternative 1 is the only choice when multiple indexes are required on a file</p> Signup and view all the answers

    Which of the following is true about the index classification?

    <p>A primary index contains the primary key of a relation</p> Signup and view all the answers

    Which of the following is true about Alternative 1 for data entries in an index?

    <p>It is the best choice when data records are very large</p> Signup and view all the answers

    Which of the following is true about Alternative 3 for data entries in an index?

    <p>It is more compact than Alternative 2</p> Signup and view all the answers

    Which of the following is true about the indexing technique used to locate data entries with a given key value?

    <p>The choice of alternative for data entries is orthogonal to the indexing technique</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser