Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

2. The database administrator will create individual user accounts to determine

ID: 3772081 • Letter: 2

Question

2. The database administrator will create individual user accounts to determine who will have access to a database.

T,F

3. Determining whether or not a particular user is who they claim to be is called ...

Availability

Authorization

Authentication

Access control

4. Determining whether or not a particular user is allowed to access and perform specific function against a database is called ...

Availability

Access control

Authentication

Authorization

5. When access to all database objects is granted to all authorized users it is said to be a ...

Open system

TAD - Total Available Database

an insecure database

DBMS - database managed system

6. Select all of the following countermeasures that are used to protect database integrity

Write-protected disks

RAID technology

user authorization

database locking software

read-only access

views

encryption

database backup and recovery

implementation of help desk procedures

public key encryption

7. Which of the following are true about database Views? (select all that apply)

A.

a result of relational operations perform against database relations to produce a new virtual relation.

B.

will generate a new physical table of the database

C.

used as an access ccontrol measure to prevent some data in a table from being accessed while allowing ofther data in that same table to be accessed.

D.

When a user accesses a view they are unaware of data attributes that are on the table(s) but missing from the view.

E.

can only be used in conjunction wiith RAID technology

8. Encryption fails to prevent data transmitted over networks. (T, F)

9. Encryption causes a degradation in the system because of the time it takes to encode/decode the data. (T,F)

10. A mechanism for protecting database integrity is through the use of a large disk array that are organized in such a way that data from failed disks can be recreated easily is called

RAID technology

Database backup and recovery

nothing - it is impossible to recreate lost data

off site storage

11. When a user who is not allowed access to a table is prohibited from executing a stored procedure that does have access to the table. (T, F)

12. An authorized user can use the REVOKE operation to give access another user. (T, F)

13. A grantor loses access to a table and it caused all users granted access by that grantor to lose it also. The following is true

Cascading revoke is implemented

Non-cascading revoke is implemented

This cannot occur. Once a user has access it can only be explicitly revoked

The is a bug in the database security.

14. The Bell-La Padula Model is an example of mandatory access control.

Answer

  True

  False

15. With multi-level security, all users access the same version of the database even if they have different security levels.

Answer

  True

  False

16. Encryption is the process of changing a message into a form that is unrecognizable from the original form.

Answer

  True

  False

17. Decryption of an encoded message always requires access to the key used to encrypt it.

Answer

  True

  False

18. Private key encryption require the sender and receiver to share the same key.

Answer

  True

  False

19. With public key encryption no secret key is necessary.

Answer

  True

  False

20. The Caesar Cipher is named after Julius Caesar an d consists of a singlle numeric value which provides an offset used to determine the encryption alphabet.

Answer

  True

  False

21. All of the following are true concerning ciphers except.

Answer

With the use of today's computers, >99% of all ciphers created before 1976 are easily broken.

Super-computers are used to break encryption ciphers.

The best ciphers are unbreakable without the key

One technique for breaking ciphers is through statistics on letter frequency.

22. Crytographic algorithms should be (select all that apply)

Answer

proven mathematically

be fast and efficient

impossible to break without a key

require a lot of work to break

always use hardware technology as back up

always yield the original method when decrypted

23. Diffie-Hellman is typically only used for key exchange because it is too inefficient to encrypt large amounts of data.

Answer

  True

  False

24. Computer forensics are used to prevent a computer breach from occurring.

Answer

  True

  False

25. Digital evidence is any data that can be extracted from a computer.

Answer

  True

  False

26. Which of the following use computer forensics ...

Answer

Criminal prosecutors

Civil litigations

Insurance Companies

Private Corporations

Law Enforcement Officials

Private Citizens

27. The first action when gathering digital evidence is to turn off all computer equipment to insure no data is changed.

Answer

  True

  False

28. A computer forensics specialist must have extensive knowledge in all of the following

Answer

Law enforcement

internal/external computing components

Understand computer BIOS

civil rights legislation

popular computer software

motherboard chipsets

memory layouts

file formats

all operating systems

DNA testing tecchniques

29. Volatile information is lost once a computer is turned off.

Answer

  True

  False

30. When a file is deleted from the recycle bin it can never be recovered.

Answer

  True

  False

31. Cell phone data cannot be recovered using computer forensics.

Answer

  True

  False

32. All investigation must be done on backups of the originall digital evidence to prevent changing the original.

Answer

  True

  False

Here is the deal:

If you get more than 5 wrong answers, I won’t give you anything.

It is piece of cake for an Expert.

Thanks

Here is the deal:

If you get more than 5 wrong answers, I won’t give you anything.

It is piece of cake for an Expert.

Thanks

2. The database administrator will create individual user accounts to determine who will have access to a database.

T,F

3. Determining whether or not a particular user is who they claim to be is called ...

Availability

Authorization

Authentication

Access control

4. Determining whether or not a particular user is allowed to access and perform specific function against a database is called ...

Availability

Access control

Authentication

Authorization

5. When access to all database objects is granted to all authorized users it is said to be a ...

Open system

TAD - Total Available Database

an insecure database

DBMS - database managed system

6. Select all of the following countermeasures that are used to protect database integrity

Write-protected disks

RAID technology

user authorization

database locking software

read-only access

views

encryption

database backup and recovery

implementation of help desk procedures

public key encryption

7. Which of the following are true about database Views? (select all that apply)

A.

a result of relational operations perform against database relations to produce a new virtual relation.

B.

will generate a new physical table of the database

C.

used as an access ccontrol measure to prevent some data in a table from being accessed while allowing ofther data in that same table to be accessed.

D.

When a user accesses a view they are unaware of data attributes that are on the table(s) but missing from the view.

E.

can only be used in conjunction wiith RAID technology

8. Encryption fails to prevent data transmitted over networks. (T, F)

9. Encryption causes a degradation in the system because of the time it takes to encode/decode the data. (T,F)

10. A mechanism for protecting database integrity is through the use of a large disk array that are organized in such a way that data from failed disks can be recreated easily is called

RAID technology

Database backup and recovery

nothing - it is impossible to recreate lost data

off site storage

11. When a user who is not allowed access to a table is prohibited from executing a stored procedure that does have access to the table. (T, F)

12. An authorized user can use the REVOKE operation to give access another user. (T, F)

13. A grantor loses access to a table and it caused all users granted access by that grantor to lose it also. The following is true

Cascading revoke is implemented

Non-cascading revoke is implemented

This cannot occur. Once a user has access it can only be explicitly revoked

The is a bug in the database security.

14. The Bell-La Padula Model is an example of mandatory access control.

Answer

  True

  False

15. With multi-level security, all users access the same version of the database even if they have different security levels.

Answer

  True

  False

16. Encryption is the process of changing a message into a form that is unrecognizable from the original form.

Answer

  True

  False

17. Decryption of an encoded message always requires access to the key used to encrypt it.

Answer

  True

  False

18. Private key encryption require the sender and receiver to share the same key.

Answer

  True

  False

19. With public key encryption no secret key is necessary.

Answer

  True

  False

20. The Caesar Cipher is named after Julius Caesar an d consists of a singlle numeric value which provides an offset used to determine the encryption alphabet.

Answer

  True

  False

21. All of the following are true concerning ciphers except.

Answer

With the use of today's computers, >99% of all ciphers created before 1976 are easily broken.

Super-computers are used to break encryption ciphers.

The best ciphers are unbreakable without the key

One technique for breaking ciphers is through statistics on letter frequency.

22. Crytographic algorithms should be (select all that apply)

Answer

proven mathematically

be fast and efficient

impossible to break without a key

require a lot of work to break

always use hardware technology as back up

always yield the original method when decrypted

23. Diffie-Hellman is typically only used for key exchange because it is too inefficient to encrypt large amounts of data.

Answer

  True

  False

24. Computer forensics are used to prevent a computer breach from occurring.

Answer

  True

  False

25. Digital evidence is any data that can be extracted from a computer.

Answer

  True

  False

26. Which of the following use computer forensics ...

Answer

Criminal prosecutors

Civil litigations

Insurance Companies

Private Corporations

Law Enforcement Officials

Private Citizens

27. The first action when gathering digital evidence is to turn off all computer equipment to insure no data is changed.

Answer

  True

  False

28. A computer forensics specialist must have extensive knowledge in all of the following

Answer

Law enforcement

internal/external computing components

Understand computer BIOS

civil rights legislation

popular computer software

motherboard chipsets

memory layouts

file formats

all operating systems

DNA testing tecchniques

29. Volatile information is lost once a computer is turned off.

Answer

  True

  False

30. When a file is deleted from the recycle bin it can never be recovered.

Answer

  True

  False

31. Cell phone data cannot be recovered using computer forensics.

Answer

  True

  False

32. All investigation must be done on backups of the originall digital evidence to prevent changing the original.

Answer

  True

  False

Availability

Access control

Authentication

Authorization

Explanation / Answer

2. The database administrator will create individual user accounts to determine who will have access to a database.

T

A database administrator controls the access of database and assigns use and control to only specified users after authentication.

3. Determining whether or not a particular user is who they claim to be is called ...

Authentication

Authentication means to prove that you are the same person whom you are claiming to be by providing the details like username, password

4. Determining whether or not a particular user is allowed to access and perform specific function against a database is called ...

Authorization:

Authorization: Applying varying limitations on users' access or actions and permitting only certain users to access, process, or alter data

5. When access to all database objects is granted to all authorized users it is said to be a ...

Open system: All users can use and do modifications as per their wish.

6. Select all of the following countermeasures that are used to protect database integrity

Write-protected disks

RAID technology

user authorization

database locking software

read-only access

views

encryption

database backup and recovery

implementation of help desk procedures

public key encryption

Authorization:

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote