18 Questions
Which of the following is a key feature of database security to ensure only authorized users can access data?
User privilege levels
Which of these is NOT a database security feature according to the text?
Installing anti-malware software on the computer system
What is the main purpose of data encryption in a database system?
To translate data into an unreadable form that can only be deciphered with a secret key
Which of the following is NOT a way that databases ensure data security according to the text?
Installing device passwords
Which of the following database security features allows lower-level users to view records but not change or delete them?
User privilege levels
What is the main purpose of using device passwords in a database system according to the text?
To restrict access to the database software on a computer
Which security practice helps prevent unauthorized access to sensitive systems or data?
Multifactor authentication
Which of the following is a legitimate source for obtaining software installation files?
Official vendor websites or repositories
Which security principle helps limit the potential damage caused by a compromised user account?
Principle of least privilege
What is a potential risk associated with installing unauthorized third-party applications?
Introduction of vulnerabilities and malware
Which of the following is an example of a physical security measure?
Entry control roster
What is the purpose of authorization in information security?
Defining the actions a user can perform
Which of the following best describes multifactor authentication?
Requiring two or more verification factors to access an account
What is the most secure source for installing software on a device?
Directly from the official vendor's website
Why is it generally recommended to avoid installing third-party apps on devices?
Third-party apps may contain malware or exploits
Which statement about authorization is true?
Authorization determines what actions a user can perform
What is an effective physical security measure for devices?
Keeping devices secured and out of sight when not in use
Which statement about software updates is true?
Software updates often include security patches and bug fixes
Test your knowledge on security practices violations by identifying which principle was violated in each scenario. Learn about the principle of least privilege and other important security measures.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free