Database Security Model Quiz

ProblemFreeQuail avatar
ProblemFreeQuail
·
·
Download

Start Quiz

Study Flashcards

25 Questions

How can the backend database be protected?

By assigning a password and specifying its location

Where is the option to set a password for the database available?

In the File/Info section under Encrypt with Password option

What can Trust Center be used for in a database?

To trust (enable) disabled content and set security options

What does the Package-and-Sign feature in Access do?

Places the database in an Access Deployment (.accdc) file and signs the package

What types of security does Oracle provide?

System security (user name and password mechanism) and data security (privileges)

What are Oracle privileges?

System privileges (action on any schema objects) and object privileges (action on specific objects)

What can roles in Oracle be granted to?

Users or a group of privileges can be granted to a role, which is then assigned to users

What does internet communication rely on?

TCP/IP, which was not designed with security in mind

What are key aspects of securing information transmission over the Internet?

Privacy, integrity, authenticity, and nonrepudiation

What are the main purposes of proxy servers in a Web environment?

Improving performance and filtering requests

Match the database security feature with its description:

Encrypt with Password option = Setting a password for the database Trust Center = Trusting disabled content and setting security options for Office Access 2010 databases Package-and-Sign feature = Placing the database in an Access Deployment (.accdc) file and signing the package Oracle system security = Providing user name and password mechanism

Match the aspects of securing information transmission over the Internet with their descriptions:

Privacy = Ensuring that information is not accessed by unauthorized parties Integrity = Ensuring that information is not altered during transmission Authenticity = Verifying the identity of the sender and receiver of information Nonrepudiation = Ensuring that the sender cannot deny sending the information

Match the Oracle privileges with their descriptions:

System privileges = Allowing action on any schema objects Object privileges = Allowing action on specific objects Roles in Oracle = Can be granted to users or a group of privileges can be granted to a role, which is then assigned to users Oracle proxy servers = Intercepting requests to determine if they can fulfill them and have two main purposes: improving performance and filtering requests

Match the Internet communication aspect with its description:

TCP/IP = Was not designed with security in mind Proxy servers in a Web environment = Intercepting requests to determine if they can fulfill them and have two main purposes: improving performance and filtering requests Trust Center = Trusting disabled content and setting security options for Office Access 2010 databases Package-and-Sign feature = Placing the database in an Access Deployment (.accdc) file and signing the package

Match the Oracle data security feature with its description:

System security (user name and password mechanism) = Providing user name and password mechanism Oracle privileges = Include system privileges (action on any schema objects) and object privileges (action on specific objects) Roles in Oracle = Can be granted to users or a group of privileges can be granted to a role, which is then assigned to users Internet communication = Relies on TCP/IP, which was not designed with security in mind

Setting a password for the database is available through the Encrypt with Password option in the File/Info section

True

Trust Center can be used to trust (enable) the disabled content in a database and set security options for Office Access 2010 databases

True

Oracle provides system security (user name and password mechanism) and data security (privileges)

True

Roles in Oracle can be granted to users or a group of privileges can be granted to a role, which is then assigned to users

True

Internet communication relies on TCP/IP, which was not designed with security in mind

True

Privacy, integrity, authenticity, and nonrepudiation are key aspects of securing information transmission over the Internet

True

Proxy servers in a Web environment intercept requests to determine if they can fulfill them and have two main purposes: improving performance and filtering requests

True

Backend database can be protected by assigning a password and specifying its location

True

Package-and-Sign feature in Access places the database in an Access Deployment (.accdc) file and signs the package

True

Oracle privileges include system privileges (action on any schema objects) and object privileges (action on specific objects)

True

Study Notes

Database Security and Administration

  • Backend database can be protected by assigning a password and specifying its location
  • Setting a password for the database is available through the Encrypt with Password option in the File/Info section
  • Trust Center can be used to trust (enable) the disabled content in a database and set security options for Office Access 2010 databases
  • Package-and-Sign feature in Access places the database in an Access Deployment (.accdc) file and signs the package
  • Oracle provides system security (user name and password mechanism) and data security (privileges)
  • Oracle privileges include system privileges (action on any schema objects) and object privileges (action on specific objects)
  • Roles in Oracle can be granted to users or a group of privileges can be granted to a role, which is then assigned to users
  • Internet communication relies on TCP/IP, which was not designed with security in mind
  • Privacy, integrity, authenticity, and nonrepudiation are key aspects of securing information transmission over the Internet
  • Proxy servers in a Web environment intercept requests to determine if they can fulfill them and have two main purposes: improving performance and filtering requests

Database Security and Administration

  • Backend database can be protected by assigning a password and specifying its location
  • Setting a password for the database is available through the Encrypt with Password option in the File/Info section
  • Trust Center can be used to trust (enable) the disabled content in a database and set security options for Office Access 2010 databases
  • Package-and-Sign feature in Access places the database in an Access Deployment (.accdc) file and signs the package
  • Oracle provides system security (user name and password mechanism) and data security (privileges)
  • Oracle privileges include system privileges (action on any schema objects) and object privileges (action on specific objects)
  • Roles in Oracle can be granted to users or a group of privileges can be granted to a role, which is then assigned to users
  • Internet communication relies on TCP/IP, which was not designed with security in mind
  • Privacy, integrity, authenticity, and nonrepudiation are key aspects of securing information transmission over the Internet
  • Proxy servers in a Web environment intercept requests to determine if they can fulfill them and have two main purposes: improving performance and filtering requests

Database Security and Administration

  • Backend database can be protected by assigning a password and specifying its location
  • Setting a password for the database is available through the Encrypt with Password option in the File/Info section
  • Trust Center can be used to trust (enable) the disabled content in a database and set security options for Office Access 2010 databases
  • Package-and-Sign feature in Access places the database in an Access Deployment (.accdc) file and signs the package
  • Oracle provides system security (user name and password mechanism) and data security (privileges)
  • Oracle privileges include system privileges (action on any schema objects) and object privileges (action on specific objects)
  • Roles in Oracle can be granted to users or a group of privileges can be granted to a role, which is then assigned to users
  • Internet communication relies on TCP/IP, which was not designed with security in mind
  • Privacy, integrity, authenticity, and nonrepudiation are key aspects of securing information transmission over the Internet
  • Proxy servers in a Web environment intercept requests to determine if they can fulfill them and have two main purposes: improving performance and filtering requests

Test your knowledge of database security models, including the assignment of security classes to database objects and subjects, as well as the ordering of security classes. Explore the concepts of top secret, secret, confidential, and unclassified data.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser