2. The database administrator will create individual user accounts to determine
ID: 3772081 • Letter: 2
Question
2. The database administrator will create individual user accounts to determine who will have access to a database.
T,F
3. Determining whether or not a particular user is who they claim to be is called ...
Availability
Authorization
Authentication
Access control
4. Determining whether or not a particular user is allowed to access and perform specific function against a database is called ...
Availability
Access control
Authentication
Authorization
5. When access to all database objects is granted to all authorized users it is said to be a ...
Open system
TAD - Total Available Database
an insecure database
DBMS - database managed system
6. Select all of the following countermeasures that are used to protect database integrity
Write-protected disks
RAID technology
user authorization
database locking software
read-only access
views
encryption
database backup and recovery
implementation of help desk procedures
public key encryption
7. Which of the following are true about database Views? (select all that apply)
A.
a result of relational operations perform against database relations to produce a new virtual relation.
B.
will generate a new physical table of the database
C.
used as an access ccontrol measure to prevent some data in a table from being accessed while allowing ofther data in that same table to be accessed.
D.
When a user accesses a view they are unaware of data attributes that are on the table(s) but missing from the view.
E.
can only be used in conjunction wiith RAID technology
8. Encryption fails to prevent data transmitted over networks. (T, F)
9. Encryption causes a degradation in the system because of the time it takes to encode/decode the data. (T,F)
10. A mechanism for protecting database integrity is through the use of a large disk array that are organized in such a way that data from failed disks can be recreated easily is called
RAID technology
Database backup and recovery
nothing - it is impossible to recreate lost data
off site storage
11. When a user who is not allowed access to a table is prohibited from executing a stored procedure that does have access to the table. (T, F)
12. An authorized user can use the REVOKE operation to give access another user. (T, F)
13. A grantor loses access to a table and it caused all users granted access by that grantor to lose it also. The following is true
Cascading revoke is implemented
Non-cascading revoke is implemented
This cannot occur. Once a user has access it can only be explicitly revoked
The is a bug in the database security.
14. The Bell-La Padula Model is an example of mandatory access control.
Answer
True
False
15. With multi-level security, all users access the same version of the database even if they have different security levels.
Answer
True
False
16. Encryption is the process of changing a message into a form that is unrecognizable from the original form.
Answer
True
False
17. Decryption of an encoded message always requires access to the key used to encrypt it.
Answer
True
False
18. Private key encryption require the sender and receiver to share the same key.
Answer
True
False
19. With public key encryption no secret key is necessary.
Answer
True
False
20. The Caesar Cipher is named after Julius Caesar an d consists of a singlle numeric value which provides an offset used to determine the encryption alphabet.
Answer
True
False
21. All of the following are true concerning ciphers except.
Answer
With the use of today's computers, >99% of all ciphers created before 1976 are easily broken.
Super-computers are used to break encryption ciphers.
The best ciphers are unbreakable without the key
One technique for breaking ciphers is through statistics on letter frequency.
22. Crytographic algorithms should be (select all that apply)
Answer
proven mathematically
be fast and efficient
impossible to break without a key
require a lot of work to break
always use hardware technology as back up
always yield the original method when decrypted
23. Diffie-Hellman is typically only used for key exchange because it is too inefficient to encrypt large amounts of data.
Answer
True
False
24. Computer forensics are used to prevent a computer breach from occurring.
Answer
True
False
25. Digital evidence is any data that can be extracted from a computer.
Answer
True
False
26. Which of the following use computer forensics ...
Answer
Criminal prosecutors
Civil litigations
Insurance Companies
Private Corporations
Law Enforcement Officials
Private Citizens
27. The first action when gathering digital evidence is to turn off all computer equipment to insure no data is changed.
Answer
True
False
28. A computer forensics specialist must have extensive knowledge in all of the following
Answer
Law enforcement
internal/external computing components
Understand computer BIOS
civil rights legislation
popular computer software
motherboard chipsets
memory layouts
file formats
all operating systems
DNA testing tecchniques
29. Volatile information is lost once a computer is turned off.
Answer
True
False
30. When a file is deleted from the recycle bin it can never be recovered.
Answer
True
False
31. Cell phone data cannot be recovered using computer forensics.
Answer
True
False
32. All investigation must be done on backups of the originall digital evidence to prevent changing the original.
Answer
True
False
Here is the deal:
If you get more than 5 wrong answers, I won’t give you anything.
It is piece of cake for an Expert.
Thanks
Here is the deal:
If you get more than 5 wrong answers, I won’t give you anything.
It is piece of cake for an Expert.
Thanks
2. The database administrator will create individual user accounts to determine who will have access to a database.
T,F
3. Determining whether or not a particular user is who they claim to be is called ...
Availability
Authorization
Authentication
Access control
4. Determining whether or not a particular user is allowed to access and perform specific function against a database is called ...
Availability
Access control
Authentication
Authorization
5. When access to all database objects is granted to all authorized users it is said to be a ...
Open system
TAD - Total Available Database
an insecure database
DBMS - database managed system
6. Select all of the following countermeasures that are used to protect database integrity
Write-protected disks
RAID technology
user authorization
database locking software
read-only access
views
encryption
database backup and recovery
implementation of help desk procedures
public key encryption
7. Which of the following are true about database Views? (select all that apply)
A.
a result of relational operations perform against database relations to produce a new virtual relation.
B.
will generate a new physical table of the database
C.
used as an access ccontrol measure to prevent some data in a table from being accessed while allowing ofther data in that same table to be accessed.
D.
When a user accesses a view they are unaware of data attributes that are on the table(s) but missing from the view.
E.
can only be used in conjunction wiith RAID technology
8. Encryption fails to prevent data transmitted over networks. (T, F)
9. Encryption causes a degradation in the system because of the time it takes to encode/decode the data. (T,F)
10. A mechanism for protecting database integrity is through the use of a large disk array that are organized in such a way that data from failed disks can be recreated easily is called
RAID technology
Database backup and recovery
nothing - it is impossible to recreate lost data
off site storage
11. When a user who is not allowed access to a table is prohibited from executing a stored procedure that does have access to the table. (T, F)
12. An authorized user can use the REVOKE operation to give access another user. (T, F)
13. A grantor loses access to a table and it caused all users granted access by that grantor to lose it also. The following is true
Cascading revoke is implemented
Non-cascading revoke is implemented
This cannot occur. Once a user has access it can only be explicitly revoked
The is a bug in the database security.
14. The Bell-La Padula Model is an example of mandatory access control.
Answer
True
False
15. With multi-level security, all users access the same version of the database even if they have different security levels.
Answer
True
False
16. Encryption is the process of changing a message into a form that is unrecognizable from the original form.
Answer
True
False
17. Decryption of an encoded message always requires access to the key used to encrypt it.
Answer
True
False
18. Private key encryption require the sender and receiver to share the same key.
Answer
True
False
19. With public key encryption no secret key is necessary.
Answer
True
False
20. The Caesar Cipher is named after Julius Caesar an d consists of a singlle numeric value which provides an offset used to determine the encryption alphabet.
Answer
True
False
21. All of the following are true concerning ciphers except.
Answer
With the use of today's computers, >99% of all ciphers created before 1976 are easily broken.
Super-computers are used to break encryption ciphers.
The best ciphers are unbreakable without the key
One technique for breaking ciphers is through statistics on letter frequency.
22. Crytographic algorithms should be (select all that apply)
Answer
proven mathematically
be fast and efficient
impossible to break without a key
require a lot of work to break
always use hardware technology as back up
always yield the original method when decrypted
23. Diffie-Hellman is typically only used for key exchange because it is too inefficient to encrypt large amounts of data.
Answer
True
False
24. Computer forensics are used to prevent a computer breach from occurring.
Answer
True
False
25. Digital evidence is any data that can be extracted from a computer.
Answer
True
False
26. Which of the following use computer forensics ...
Answer
Criminal prosecutors
Civil litigations
Insurance Companies
Private Corporations
Law Enforcement Officials
Private Citizens
27. The first action when gathering digital evidence is to turn off all computer equipment to insure no data is changed.
Answer
True
False
28. A computer forensics specialist must have extensive knowledge in all of the following
Answer
Law enforcement
internal/external computing components
Understand computer BIOS
civil rights legislation
popular computer software
motherboard chipsets
memory layouts
file formats
all operating systems
DNA testing tecchniques
29. Volatile information is lost once a computer is turned off.
Answer
True
False
30. When a file is deleted from the recycle bin it can never be recovered.
Answer
True
False
31. Cell phone data cannot be recovered using computer forensics.
Answer
True
False
32. All investigation must be done on backups of the originall digital evidence to prevent changing the original.
Answer
True
False
Availability
Access control
Authentication
Authorization
Explanation / Answer
2. The database administrator will create individual user accounts to determine who will have access to a database.
T
A database administrator controls the access of database and assigns use and control to only specified users after authentication.
3. Determining whether or not a particular user is who they claim to be is called ...
Authentication
Authentication means to prove that you are the same person whom you are claiming to be by providing the details like username, password
4. Determining whether or not a particular user is allowed to access and perform specific function against a database is called ...
Authorization:
Authorization: Applying varying limitations on users' access or actions and permitting only certain users to access, process, or alter data
5. When access to all database objects is granted to all authorized users it is said to be a ...
Open system: All users can use and do modifications as per their wish.
6. Select all of the following countermeasures that are used to protect database integrity
Write-protected disks
RAID technology
user authorization
database locking software
read-only access
views
encryption
database backup and recovery
implementation of help desk procedures
public key encryption
Authorization:
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.