Computer Security Chapter 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

__________ encompasses intrusion detection, prevention and response. A. Intrusion management B. Security assessments C. Database access control D. Data loss prevention

A. Intrusion management

__________ specifies the minimum requirements for telecommunications infrastructure of data centers. A. TIA-492 B. RFC-4949 C. NIST-7883 D. RSA-298

A. TIA-492

A(n) __________ is a user who has administrative responsibility for part or all of the database. A. administrator B. database relations manager C. application owner D. end user other than application owner

A. administrator

A ___________ is the portion of the data center that houses data processing equipment. A. computer room B. main distribution area C. entrance room D. horizontal distribution

A. computer room

The basic building block of a __________ is a table of data, consisting of rows and columns, similar to a spreadsheet. A. relational database B. query set C. DBMS D. perturbation

A. relational database

_________ is an organization that produces data to be made available for controlled release, either within the organization or to external users. A. Client B. Data owner C. User D. Server

B. Data owner

__________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received. A. Perturbation B. Inference C. Compromise D. Partitioning

B. Inference

A(n) __________ is a structured collection of data stored for use by one or more applications. A. attribute B. database C. tuple D. inference

B. database

An end user who operates on database objects via a particular application but does not own any of the database objects is the __________. A. application owner B. end user other than application owner C. foreign key D. administrator

B. end user other than application owner

__________ houses cross-connects and active equipment for distributing cable to the equipment distribution area. A. Main distribution area B. Equipment distribution area C. Horizontal distribution area D. Zone distribution area

C. Horizontal distribution area

A _________ is defined to be a portion of a row used to uniquely identify a row in a table. A. foreign key B. query C. primary key D. data perturbation

C. primary key

A _________ is a virtual table. A. tuple B. query C. view D. DBMS

C. view

_________ is an organization that receives the encrypted data from a data owner and makes them available for distribution to clients. A. User B. Client C. Data owner D. Server

D. Server

In relational database parlance, the basic building block is a __________, which is a flat table. A. attribute B. tuple C. primary key D. relation

D. relation

In a relational database rows are referred to as _________. A. relations B. attributes C. views D. tuples

D. tuples

T or F? A single countermeasure is sufficient for SQLi attacks.

False

T or F? A view cannot provide restricted access to a relational database so it cannot be used for security purposes.

False

T or F? Business continuity consists of security services that allocate access, distribute, monitor, and protect the underlying resource services.

False

T or F? Fixed server roles operate at the level of an individual database

False

T or F? The cloud carrier is useful when cloud services are too complex for a cloud consumer to easily manage.

False

Encryption is a pervasive service that can be provided for data at rest in the cloud.

True

T or F? A foreign key value can appear multiple times in a table.

True

T or F? A query language provides a uniform interface to the database.

True

T or F? An IDS is a set of automated tools designed to detect unauthorized access to a host system.

True

T or F? An IPS incorporates IDS functionality but also includes mechanisms designed to block traffic from intruders.

True

T or F? SQL Server allows users to create roles that can then be assigned access rights to portions of the database.

True

T or F? The CSP can provide backup at multiple locations, with reliable failover and disaster recovery facilities.

True

T or F? The database management system makes use of the database description tables to manage the physical database.

True

T or F? The value of a primary key must be unique for each tuple of its table.

True

T or F? To create a relationship between two tables, the attributes that define the primary key in one table must appear as attributes in another table, where they are referred to as a foreign key.

True


Set pelajaran terkait

Decision Chapter 2 intro To Probability

View Set

Organismal Biology Lab Practical 1

View Set

Clinical Interview Final Exam study guide

View Set