Test on database security P4
Today Network Administrator will give you reading multiple choice questions around the topic of databases, with certain questions below you will have more useful knowledge.
- Question 1. Which of the following statements is not confidential in the database system?
- Preventing unauthorized access
- Minimize user errors
- Ensure information is not lost or changed unintentionally
- Control the number of database users
-
- Question 2. Solutions for database security include:
- Decentralize access, user identification, information encryption and data compression, save records
- Access permissions, user identification, information encryption and data compression, policy and awareness, record keeping, password settings
- User identification, information encryption and data compression, policy and awareness, save minutes
- Distributed access, user identification; encoding information and compressing data; policy and consciousness; save the minutes
-
- Question 3. Factors involved in system security such as passwords, encryption of information need to:
- Do not change to ensure consistency
- Should only be changed if the user requests it
- Must constantly change to enhance security
- It should only be changed once after the user logs in to the system for the first time
-
- Question 4. To identify the user when logging into the database, in addition to the password, which of the following identifiers is used:
- Image
- Sound
- Identity card
- Voice, fingerprint, retina, electronic signature
-
- Question 5. Normally, users who want to access the database system need to provide:
- Image
- Signature
- User name
- Account name and password
-
- Question 6. In the following statements, which statements are not the functions of the system minutes?
- Save the number of visits to the system
- Save information of visitors to the system
- Save requests for system lookup
- User identification to provide data that they are authorized to access
-
- Question 7. Which of the following statements is incorrect when it comes to coding information?
- Important and sensitive information should be stored in encrypted form
- Encrypt information to reduce the possibility of information leakage
- Data compression also contributes to the security of data
- The information will be absolutely secure after it has been encrypted
-
- Question 8. Which of the following statements is incorrect?
- Database management system does not provide users with a way to change passwords
- Should periodically change the password
- Change the password to enhance password protection
- Database management system provides users with a way to change passwords
-
- Question 9. Which of the following statements is incorrect when talking about the system record function?
- Indicate the number of accesses to the system, on each component of the system, on each search request .
- Give information about some last update
- Save updates, implementers, updates
- Save the updated person's personal information
-
- Question 10. To improve the effectiveness of security, we need to:
- Regularly copy data
- Regularly change the parameters of the protection system
- Regularly upgrade hardware and software
- User identification by encryption
-
4 ★ | 3 Vote
You should read it
- Database test
- ASP.NET Test - Part 1
- Test Linnux operating system
- eQuiz - Multiple choice test about Networking Basic
- Test of database security P9
- Testing of system maintenance
- Test about database security P13
- Test on database security P7
- Testing about P2 system maintenance
- Test whether you used email correctly?
- Test your understanding of well-known electronic technology firms
- Test of PowerPoint computing - Part 2
Maybe you are interested
7 Best Chrome Extensions for Quick Information Gathering
Dota 2 7.22c Update Information
What information can your ISP see when you turn on a VPN?
How to set up personal safety information on Android
What information does a VPN hide? How does it protect your data?
Instructions for changing and editing music file information using 3uTools