Access Control Models and Mechanisms Quiz
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

RBAC stands for

  • Role-Based Access Control (correct)
  • Responsibility-Based Access Control
  • Rule-Based Access Control
  • Random-Based Access Control

Encryption is often described as

  • The only line of defense
  • The last line of defense (correct)
  • The first line of defense
  • The weakest line of defense

Symmetric key encryption requires

  • A key generated for each message
  • The same encryption and decryption keys (correct)
  • A public and private key
  • Different encryption and decryption keys

Public key encryption involves

<p>Publishing the encryption key for anyone to use (D)</p> Signup and view all the answers

The ARIES recovery algorithm is designed to work with

<p>A steal and no-force approach (C)</p> Signup and view all the answers

Database auditing is used to

<p>Prevent unauthorized access (D)</p> Signup and view all the answers

The three main principles of the ARIES recovery algorithm include all of the following except

<p>Crash recovery after a crash (B)</p> Signup and view all the answers

Which type of log record is appended after modifying a page?

<p>Update (A)</p> Signup and view all the answers

What is the purpose of a commit type log record?

<p>To force-write the log tail to stable storage (A)</p> Signup and view all the answers

What type of log record is appended when a transaction is aborted?

<p>Abort (A)</p> Signup and view all the answers

What additional action is taken when a transaction is aborted or committed?

<p>A master record is written (C)</p> Signup and view all the answers

What is the purpose of a compensation log record (CLR)?

<p>To undo the action described by an update log record (B)</p> Signup and view all the answers

What is the purpose of a checkpoint in a DBMS?

<p>All of the above (D)</p> Signup and view all the answers

Which step marks the beginning of a checkpoint?

<p>Begin_checkpoint (C)</p> Signup and view all the answers

Which table in a DBMS stores the lastLSN and status of transactions?

<p>Xact Table (D)</p> Signup and view all the answers

Where is the master record written in a DBMS?

<p>RAM (D)</p> Signup and view all the answers

Which of the following best describes a clustered index?

<p>A clustered index is an index where the order of data records is the same as the order of data entries. (A)</p> Signup and view all the answers

What is the purpose of database security?

<p>To ensure that data is kept safe from corruption and access to it is suitably controlled. (A)</p> Signup and view all the answers

Which of the following statements is true about dense indexes?

<p>A dense index has at least one data entry per search key value. (B)</p> Signup and view all the answers

Which of the following is a risk associated with database security?

<p>Unintended activity or misuse by authorized database users. (A)</p> Signup and view all the answers

What is the purpose of access control in database security?

<p>To selectively restrict access to a place or resource. (C)</p> Signup and view all the answers

Which of the following factors can be used for authenticating information?

<p>Something the user knows, something the user has, something the user is. (C)</p> Signup and view all the answers

Which access control model allows the policy designer to define a security policy independently of the implementation?

<p>Organization-Based Access Control (OrBAC) (B)</p> Signup and view all the answers

What is the difference between a search key and a key?

<p>A search key is any subset of the fields of a relation, while a key is a minimal set of fields that uniquely identify a record (A)</p> Signup and view all the answers

Which of the following is true about an index on a file?

<p>It supports efficient retrieval of all data entries with a given key value (B)</p> Signup and view all the answers

Which of the following is true about the alternatives for data entries in an index?

<p>Alternative 1 is the only choice when multiple indexes are required on a file (B)</p> Signup and view all the answers

Which of the following is true about the index classification?

<p>A primary index contains the primary key of a relation (A)</p> Signup and view all the answers

Which of the following is true about Alternative 1 for data entries in an index?

<p>It is the best choice when data records are very large (C)</p> Signup and view all the answers

Which of the following is true about Alternative 3 for data entries in an index?

<p>It is more compact than Alternative 2 (B)</p> Signup and view all the answers

Which of the following is true about the indexing technique used to locate data entries with a given key value?

<p>The choice of alternative for data entries is orthogonal to the indexing technique (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser