Chap_10: Data Security Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following can be used for data security EXCEPT?

  • Data encryption
  • A view
  • Authorization
  • Ms Word software (correct)

What is the main purpose of access control?

  • To authorize full access to authorized users
  • To limit the actions or operations that legitimate users can perform (correct)
  • To stop unauthorized users from accessing resources
  • To protect the computer from viral infections

What is one recommended measures to protect your database from security threats?

  • Providing regular employee training (correct)
  • Increasing the attack surface of your network
  • Allowing unrestricted privileges for all users
  • Storing unencrypted backups

Data security threats include:

<p>All of the above. (D)</p> Signup and view all the answers

What is the role of privileges in access control?

<p>Privileges determine user access levels (B)</p> Signup and view all the answers

Why is security always a main consideration for data

<p>Both to prevent data breaches and protect user information (D)</p> Signup and view all the answers

Which security measure involves protecting data by encoding it in a way that can only be decrypted with the appropriate key?

<p>Data encryption (D)</p> Signup and view all the answers

What potential security risk is associated with unauthorized access to university admissions databases?

<p>Exposure of student personal information (A)</p> Signup and view all the answers

Loss of availability in a database refers to _____.

<p>Unavailability of data (C)</p> Signup and view all the answers

Which security risk is commonly associated with databases storing social media account information?

<p>Unauthorized account access (C)</p> Signup and view all the answers

What does physical security measures protect data from?

<p>Fire, water, and theft (C)</p> Signup and view all the answers

Which countermeasures involve creating copies of data to restore it in case of data loss or system failure?

<p>Backup and recovery (C)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser