Вы находитесь на странице: 1из 1

Group 10 I.T.

Quiz (3-11)
1. The DBMSs security subsystem is also known as
a. authentication subsystem
b. authorization subsystem
c. integrity subsystem
d. protection subsystem
2. It is any intentional or accidental event that may
adversely affect the system.
a. Threat
b. Virus

c. Fraud
d. Audit Trail

11. Which of the following statement is FALSE?

Class A provides a discretionary protection
Class B provides a verified protection
Class C provides a mandatory protection
Class D provides a minimal protection

3. Which of the following, who did not invented public

key encryption?


a. Ralph Merkle
c. Martin Edward Hellman

12. A mechanism that determines whether a user is

who he/she claims to be.

b .Mitsuru Matsui
d. Whitfield

4. It is a database that contains a lot of individually

sensitive items of information.
a. Data Encryption
b. Statistical Database

c. Discretionary
d. Cascade Database

5. The mechanism that protect the database against

intentional or accidental threats.
a. Integrity
b. Database Log

c. Password
d. Security

6. A database log that is used mainly for security

a. Security Constraint
b. Mandatory Access Control

c. Clearance Level
d. Audit Trails

7. A set of security requirements for any Trusted

Computing Base
a. Orange book
b. Lavender book

c. Red book
d. Blue book

8. Characterized by a high degree of flexibility, which

makes them suitable for a large variety of application

d. All of the above

a. Context-dependent authority c. Authentication

b. Audit Trails
d. Authorization
13. Storing and transmitting sensitive data in
encrypted form.
a. Date Encryption
b. Substitution

c. Permutation
d. SQL Facilities

14. It is given by your computer to any computer that

wants to communicate securely with it.
a. Public Key
b. Key

c. Encryption Key
d. Private Key

15. Which can be used to hide sensitive data from

unauthorized users.
a. SQL Facilities
b. Authorization Subsystem

c. Asymmetric
d. View Mechanism

16. It defines an interpretation of the TCB

requirements for database systems specifically.
a. Orange Book
b. Lavender Book

c. Security
d. Multi-level

17. It is the output from algorithm.

a. Individual tracker
Access Control
b. Discretionary Access Control

c. Mandatory
d. Verified Protection

9. APPEND and REPLACE are the QUEL analogs of what

a.Select and Update
c.Delete and Update

b.Select and Insert

d.Insert and Update

10. Each data is labeled with a certain classification

level, and each user is given a certain clearance level
a. Discretionary Control
b. Individual Tracker

c. Mandatory Control
d. General Tracker

a. Data Encryption
b. Integrity

c. Cipher text
d. Data Encryption

18. It is a block cipher that uses shared secret

a. Asymmetric-key Encryption c. Encryption Algorithm
b. Cipher text
d. Data Encryption

19. Ensure a high degree of protection in a way; they

prevent any illegal flow of information.
a. Mandatory Access Control
b. Encryption Key

c. Clearance Level

20. Maintaining a secure database system by

preventing data from becoming invalid.
a. Integrity
b. Security

c. Password
d. Mandatory Control