- Preventing unauthorized access
- Minimize user errors
- Ensure information is not lost or changed unintentionally
- Control the number of database users
Test on database security P4
Today Network Administrator will give you reading multiple choice questions around the topic of databases, with certain questions below you will have more useful knowledge.
- Question 1. Which of the following statements is not confidential in the database system?
- Question 2. Solutions for database security include:
- Decentralize access, user identification, information encryption and data compression, save records
- Access permissions, user identification, information encryption and data compression, policy and awareness, record keeping, password settings
- User identification, information encryption and data compression, policy and awareness, save minutes
- Distributed access, user identification; encoding information and compressing data; policy and consciousness; save the minutes
-
- Question 3. Factors involved in system security such as passwords, encryption of information need to:
- Do not change to ensure consistency
- Should only be changed if the user requests it
- Must constantly change to enhance security
- It should only be changed once after the user logs in to the system for the first time
-
- Question 4. To identify the user when logging into the database, in addition to the password, which of the following identifiers is used:
- Image
- Sound
- Identity card
- Voice, fingerprint, retina, electronic signature
-
- Question 5. Normally, users who want to access the database system need to provide:
- Image
- Signature
- User name
- Account name and password
-
- Question 6. In the following statements, which statements are not the functions of the system minutes?
- Save the number of visits to the system
- Save information of visitors to the system
- Save requests for system lookup
- User identification to provide data that they are authorized to access
-
- Question 7. Which of the following statements is incorrect when it comes to coding information?
- Important and sensitive information should be stored in encrypted form
- Encrypt information to reduce the possibility of information leakage
- Data compression also contributes to the security of data
- The information will be absolutely secure after it has been encrypted
-
- Question 8. Which of the following statements is incorrect?
- Database management system does not provide users with a way to change passwords
- Should periodically change the password
- Change the password to enhance password protection
- Database management system provides users with a way to change passwords
-
- Question 9. Which of the following statements is incorrect when talking about the system record function?
- Indicate the number of accesses to the system, on each component of the system, on each search request .
- Give information about some last update
- Save updates, implementers, updates
- Save the updated person's personal information
-
- Question 10. To improve the effectiveness of security, we need to:
- Regularly copy data
- Regularly change the parameters of the protection system
- Regularly upgrade hardware and software
- User identification by encryption
-
Update 24 May 2019
You should read it
- Database test
- ASP.NET Test - Part 1
- Test Linnux operating system
- eQuiz - Multiple choice test about Networking Basic
- Test of database security P9
- Testing of system maintenance
- Test about database security P13
- Test on database security P7
- Testing about P2 system maintenance
- Test whether you used email correctly?
- Test your understanding of well-known electronic technology firms
- Test of PowerPoint computing - Part 2
Maybe you are interested
Are the game consoles infected with viruses? PlayStation 5: Detailed specifications Sony announced the Playstation 5 configuration: Strong as the current PC crisis, but the hardware specifications are still inferior to the Xbox Series X Gaming machines 'hybrid' of Sony and Nintendo The father of the legendary code 'Contra 30 lives' has passed away Few mid-range Android smartphones are favored for gaming this much