Podcast
Questions and Answers
Which of the following can be used for data security EXCEPT?
Which of the following can be used for data security EXCEPT?
- Data encryption
- A view
- Authorization
- Ms Word software (correct)
What is the main purpose of access control?
What is the main purpose of access control?
- To authorize full access to authorized users
- To limit the actions or operations that legitimate users can perform (correct)
- To stop unauthorized users from accessing resources
- To protect the computer from viral infections
What is one recommended measures to protect your database from security threats?
What is one recommended measures to protect your database from security threats?
- Providing regular employee training (correct)
- Increasing the attack surface of your network
- Allowing unrestricted privileges for all users
- Storing unencrypted backups
Data security threats include:
Data security threats include:
What is the role of privileges in access control?
What is the role of privileges in access control?
Why is security always a main consideration for data
Why is security always a main consideration for data
Which security measure involves protecting data by encoding it in a way that can only be decrypted with the appropriate key?
Which security measure involves protecting data by encoding it in a way that can only be decrypted with the appropriate key?
What potential security risk is associated with unauthorized access to university admissions databases?
What potential security risk is associated with unauthorized access to university admissions databases?
Loss of availability in a database refers to _____.
Loss of availability in a database refers to _____.
Which security risk is commonly associated with databases storing social media account information?
Which security risk is commonly associated with databases storing social media account information?
What does physical security measures protect data from?
What does physical security measures protect data from?
Which countermeasures involve creating copies of data to restore it in case of data loss or system failure?
Which countermeasures involve creating copies of data to restore it in case of data loss or system failure?