Chapter 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a firewall?

A security system consisting of software or hardware between an internal network and the Internet

What is a computer virus?

A type of malware that replicates itself into computer programs and performs some type of harmful activity

______ limits who gains access to the database while ______ limits what a user can access within the database

Access authentication, view definition

Which of the following tasks is a typical role of a database administrator?

All are typical tasks

In regards to information security, which of the following is part of identity and access management?

All of the answers are correct

What would be an example of a violation of the principle of confidentiality?

An employee accessing a payroll database to find out how much others are paid

Ensuring data recoverability is done using?

Backup and restore operations

The following are the components of CIA triads except?

Consistency

Which of the following would be the best option for preventing unauthorized access to the database?

Creating stored procedures

You have just completed a project and need to take away the SELECT option for a testing team. Which SQL option will function the best?

DROP ROLE project_x;

______ is the process of transforming data into an unreadable form to anyone who does not know the key

Data encryption

Consider the following SQL. For best security, what type of user should Aaron Burr be? GRANT ALL ON tblUsers TO 'Aaron Burr';

Database administrator

What does the acronym DBA stand for in the context of information systems?

Database administrator

The database administrator is Edmond Dantes. What issues, if any, are present with the following SQL command? REVOKE ALL ON master_database FROM 'Edmond Dantes';

Edmond Dantes will have NO access to the database

What is NOT an example of physical security?

Encrypting email messages

How can data integrity be achieved?

Encryption

Why is database reliability important to organizations?

Ensures accuracy of business information

Which of the following is NOT a type of information security?

Financial database management

______ are threats to a database system

Hackers and SQL injection attacks

______ refers to the process of making sure only those who are entitled to information can access it

Information security

Which one of the following is a component of data reliability?

Integrity

Database security management:

Is the collection of processes and procedures used to protect data and database systems

Why should security testing be a part of information security requirements?

It checks to see if expected security protection really is in place

What is the main idea behind the principle of availability in information security?

People who are authorized to view data can do so when they need access

The ______ ensures that people only have access to the information they need to do their jobs

Principle of least privilege

What is the purpose of security operations in regards to information security?

Provide procedures and plans for maintaining security, such as security patching procedures, incident response and disaster recovery plans

A fast way to get a disrupted system that has been breached up and running is to:

Restore an updated data backup

Why does data need to have a recorded owner?

The data owner makes decisions about access to the data

What is data encryption?

The process of encoding messages so it can only be viewed by authorized individuals

Consider that you have a web site that connects to a sales database. Some of the SQL queries are embedded in the page. What security threat, if any, are you most likely to face?

There is a risk a hacker would use SQL injection


Ensembles d'études connexes

Aquifer FM Qs at end of case 1-40

View Set

Consumer Behavior Test 1 (Chapter 1-4)

View Set

BYU HIST 202: Midterm (quiz questions)

View Set