Chap_10: Data Security Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following can be used for data security EXCEPT?

  • Data encryption
  • A view
  • Authorization
  • Ms Word software (correct)

What is the main purpose of access control?

  • To authorize full access to authorized users
  • To limit the actions or operations that legitimate users can perform (correct)
  • To stop unauthorized users from accessing resources
  • To protect the computer from viral infections

What is one recommended measures to protect your database from security threats?

  • Providing regular employee training (correct)
  • Increasing the attack surface of your network
  • Allowing unrestricted privileges for all users
  • Storing unencrypted backups

Data security threats include:

<p>All of the above. (D)</p> Signup and view all the answers

What is the role of privileges in access control?

<p>Privileges determine user access levels (B)</p> Signup and view all the answers

Why is security always a main consideration for data

<p>Both to prevent data breaches and protect user information (D)</p> Signup and view all the answers

Which security measure involves protecting data by encoding it in a way that can only be decrypted with the appropriate key?

<p>Data encryption (D)</p> Signup and view all the answers

What potential security risk is associated with unauthorized access to university admissions databases?

<p>Exposure of student personal information (A)</p> Signup and view all the answers

Loss of availability in a database refers to _____.

<p>Unavailability of data (C)</p> Signup and view all the answers

Which security risk is commonly associated with databases storing social media account information?

<p>Unauthorized account access (C)</p> Signup and view all the answers

What does physical security measures protect data from?

<p>Fire, water, and theft (C)</p> Signup and view all the answers

Which countermeasures involve creating copies of data to restore it in case of data loss or system failure?

<p>Backup and recovery (C)</p> Signup and view all the answers
Use Quizgecko on...
Browser
Browser