Security Practices Violations Quiz
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a key feature of database security to ensure only authorized users can access data?

  • Device passwords
  • Data encryption
  • Anti-malware protection
  • User privilege levels (correct)

Which of these is NOT a database security feature according to the text?

  • Restricting access to the database software with a device password
  • Installing anti-malware software on the computer system (correct)
  • Encrypting data to make it unreadable without a secret key
  • Assigning different privilege levels to users

What is the main purpose of data encryption in a database system?

  • To restrict access to all users except the top-level administrator
  • To translate data into an unreadable form that can only be deciphered with a secret key (correct)
  • To prevent unauthorized access to the database software
  • To install anti-malware protection on the computer system

Which of the following is NOT a way that databases ensure data security according to the text?

<p>Installing device passwords (B)</p> Signup and view all the answers

Which of the following database security features allows lower-level users to view records but not change or delete them?

<p>User privilege levels (B)</p> Signup and view all the answers

What is the main purpose of using device passwords in a database system according to the text?

<p>To restrict access to the database software on a computer (A)</p> Signup and view all the answers

Which security practice helps prevent unauthorized access to sensitive systems or data?

<p>Multifactor authentication (A)</p> Signup and view all the answers

Which of the following is a legitimate source for obtaining software installation files?

<p>Official vendor websites or repositories (A)</p> Signup and view all the answers

Which security principle helps limit the potential damage caused by a compromised user account?

<p>Principle of least privilege (D)</p> Signup and view all the answers

What is a potential risk associated with installing unauthorized third-party applications?

<p>Introduction of vulnerabilities and malware (C)</p> Signup and view all the answers

Which of the following is an example of a physical security measure?

<p>Entry control roster (D)</p> Signup and view all the answers

What is the purpose of authorization in information security?

<p>Defining the actions a user can perform (B)</p> Signup and view all the answers

Which of the following best describes multifactor authentication?

<p>Requiring two or more verification factors to access an account (B)</p> Signup and view all the answers

What is the most secure source for installing software on a device?

<p>Directly from the official vendor's website (C)</p> Signup and view all the answers

Why is it generally recommended to avoid installing third-party apps on devices?

<p>Third-party apps may contain malware or exploits (D)</p> Signup and view all the answers

Which statement about authorization is true?

<p>Authorization determines what actions a user can perform (C)</p> Signup and view all the answers

What is an effective physical security measure for devices?

<p>Keeping devices secured and out of sight when not in use (B)</p> Signup and view all the answers

Which statement about software updates is true?

<p>Software updates often include security patches and bug fixes (D)</p> Signup and view all the answers

More Like This

Security Guard Final Flashcards
45 questions
Software Security Practices Chapter 2
18 questions
Use Quizgecko on...
Browser
Browser