1 .Which of the following is primarily used for security? Logical database desig
ID: 3916578 • Letter: 1
Question
1 .Which of the following is primarily used for security?
Logical database design rules
Authorization rules
View integration
CREATE TABLE statements
2 .A conceptual data model of an entire organization, which is used for data planning and decision support, is called a comprehensive view.
True
False
With discretionary access control, users may be individually given access rights to specific data, or these access privileges may be granted to groups of users.
True
False
3. Two forms of authorization controls are _________ and ____________?
Discretionary Access Control / Mandatory Access Control
Public key / Private key
Primary key / Foreign key
Internal Access Control / External Access Control
None of the above
a.Logical database design rules
b.Authorization rules
c.View integration
d.CREATE TABLE statements
Explanation / Answer
Have provides explanations of 1, 3 questions. let me know if you have any doubts regarding the below explanations.
1] primarily used for security purpose is option (b) - Authorization rules
Authorization primarily includes 2 processes
(i) permitting only certain users to access, process or alter data
(ii) Applying varying limitations on users access or actions. The limitations placed on( or removed from) users can apply to objects, such as schemas, tables, or rows, or to resources, such as time (CPU, connect, or idle times).
3] option ( a ) is correct - Discretionary Access Control / Mandatory Access Control
for every access attempt, before a subject can communicate with an object, the security monitor reviews the rules of access control model to determine whether the request is allowed.
DAC - if a user creates a file, he is the owner of the file. An identifier for this user is placed in the file header. A system that uses DAC enables the owner of the resources to specify which subjects can access resources. This model is called Discretionary Acess Control because the control of access is based on the direction of the owner.
MAC - users and data owners cannot detemine who can access files.
This model is much more structured and strict and is based on a security label system. Users are given a security clearance and data is classified in the same way. The clearance and classification data is stored in the security labels, which are bound to the specific subjects and objects.
when the system makes a decision about fulfilling a request to access an object, it is based on the clearance of the subject, the classification of the object, and the security policy of the system.
The rules for how subjects access objects are made by the security officer, configured by the administrator, enforced by the operating system, and supported by the security technologies.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.