Test on database security P4

Today Network Administrator will give you reading multiple choice questions around the topic of databases, with certain questions below you will have more useful knowledge.

  1. Question 1. Which of the following statements is not confidential in the database system?
    1. Preventing unauthorized access
    2. Minimize user errors
    3. Ensure information is not lost or changed unintentionally
    4. Control the number of database users
  2. Question 2. Solutions for database security include:
    1. Decentralize access, user identification, information encryption and data compression, save records
    2. Access permissions, user identification, information encryption and data compression, policy and awareness, record keeping, password settings
    3. User identification, information encryption and data compression, policy and awareness, save minutes
    4. Distributed access, user identification; encoding information and compressing data; policy and consciousness; save the minutes
  3. Question 3. Factors involved in system security such as passwords, encryption of information need to:
    1. Do not change to ensure consistency
    2. Should only be changed if the user requests it
    3. Must constantly change to enhance security
    4. It should only be changed once after the user logs in to the system for the first time
  4. Question 4. To identify the user when logging into the database, in addition to the password, which of the following identifiers is used:
    1. Image
    2. Sound
    3. Identity card
    4. Voice, fingerprint, retina, electronic signature
  5. Question 5. Normally, users who want to access the database system need to provide:
    1. Image
    2. Signature
    3. User name
    4. Account name and password
  6. Question 6. In the following statements, which statements are not the functions of the system minutes?
    1. Save the number of visits to the system
    2. Save information of visitors to the system
    3. Save requests for system lookup
    4. User identification to provide data that they are authorized to access
  7. Question 7. Which of the following statements is incorrect when it comes to coding information?
    1. Important and sensitive information should be stored in encrypted form
    2. Encrypt information to reduce the possibility of information leakage
    3. Data compression also contributes to the security of data
    4. The information will be absolutely secure after it has been encrypted
  8. Question 8. Which of the following statements is incorrect?
    1. Database management system does not provide users with a way to change passwords
    2. Should periodically change the password
    3. Change the password to enhance password protection
    4. Database management system provides users with a way to change passwords
  9. Question 9. Which of the following statements is incorrect when talking about the system record function?
    1. Indicate the number of accesses to the system, on each component of the system, on each search request .
    2. Give information about some last update
    3. Save updates, implementers, updates
    4. Save the updated person's personal information
  10. Question 10. To improve the effectiveness of security, we need to:
    1. Regularly copy data
    2. Regularly change the parameters of the protection system
    3. Regularly upgrade hardware and software
    4. User identification by encryption
Update 24 May 2019
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile