MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Rdbms knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is a valid encryption technique? |
| A. | Parallel key encryption |
| B. | Public key encryption |
| C. | Systematic key encryption |
| D. | All of the mentioned |
| Answer» C. Systematic key encryption | |
| 2. |
A log of all changes to the application data is called as __________ |
| A. | Audit trail |
| B. | Audit log |
| C. | Audit lead |
| D. | Data log |
| Answer» B. Audit log | |
| 3. |
________________ALLOWS_A_SYSTEM_ADMINISTRATOR_TO_ASSOCIATE_A_FUNCTION_WITH_A_RELATION;_THE_FUNCTION_RETURNS_A_PREDICATE_THAT_MUST_BE_ADDED_TO_ANY_QUERY_THAT_USES_THE_RELATION.?$ |
| A. | OpenID |
| B. | Single-site system |
| C. | Security Assertion Markup Language (SAML) |
| D. | Virtual Private Database (VPD) |
| Answer» E. | |
| 4. |
A_LOG_OF_ALL_CHANGES_TO_THE_APPLICATION_DATA_IS_CALLED_AS___________?$ |
| A. | Audit trail |
| B. | Audit log |
| C. | Audit lead |
| D. | Data log |
| Answer» B. Audit log | |
| 5. |
VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism.$ |
| A. | Row-level authorization |
| B. | Column-level authentication |
| C. | Row-type authentication |
| D. | Authorization security |
| Answer» B. Column-level authentication | |
| 6. |
Which_of_the_following_is_a_valid_encryption_technique?$ |
| A. | Parallel key encryption |
| B. | Public key encryption |
| C. | Systematic key encryption |
| D. | All of the mentioned |
| Answer» C. Systematic key encryption | |
| 7. |
The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years? |
| A. | OpenID |
| B. | Single-site system |
| C. | Security Assertion Markup Language (SAML) |
| D. | Virtual Private Database (VPD) |
| Answer» B. Single-site system | |
| 8. |
What is the standard for exchanging authentication and authorization information between two different security domains? |
| A. | SABM |
| B. | STML |
| C. | SPTA |
| D. | SAML |
| Answer» E. | |
| 9. |
The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on. |
| A. | OpenID |
| B. | Sign-on system |
| C. | Security Assertion Markup Language (SAML) |
| D. | Virtual Private Database (VPD) |
| Answer» D. Virtual Private Database (VPD) | |
| 10. |
What are phishing attacks? |
| A. | Users are forced to use a second server which causes the attack |
| B. | Users are forced to divert to a fake site where the attack takes place |
| C. | Users are fooled by similar GUI and data is extracted from them. |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 11. |
A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.$ |
| A. | OpenID |
| B. | Sign-on system |
| C. | Security Assertion Markup Language (SAML) |
| D. | Virtual Private Database (VPD) |
| Answer» C. Security Assertion Markup Language (SAML) | |
| 12. |
What are man in the middle attacks? |
| A. | Users are forced to use a second server which causes the attack |
| B. | Users are forced to divert to a fake site where the attack takes place |
| C. | Users are fooled by similar GUI and data is extracted from them. |
| D. | None of the mentioned |
| Answer» C. Users are fooled by similar GUI and data is extracted from them. | |
| 13. |
Even with two-factor authentication, users may still be vulnerable to_____________attacks. |
| A. | Radiant |
| B. | Cross attack |
| C. | scripting |
| D. | Man-in-the-middle |
| Answer» E. | |
| 14. |
The system where two independent pieces of data are used to identify a user is called as ______ |
| A. | Two system authentication |
| B. | ID password authentication |
| C. | Two factor authentication |
| D. | Multi data authentication |
| Answer» D. Multi data authentication | |
| 15. |
Many applications use _________________ where two independent factors are used to identify a user. |
| A. | Two-factor authentication |
| B. | Cross-site request forgery |
| C. | Cross-site scripting |
| D. | Cross-site scoring scripting |
| Answer» B. Cross-site request forgery | |
| 16. |
State true or false: Password leakage is a major security problem |
| A. | True |
| B. | False |
| Answer» B. False | |
| 17. |
_________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
| A. | Two-factor authentication |
| B. | Cross-site request forgery |
| C. | Cross-site scripting |
| D. | Cross-site scoring scripting |
| Answer» C. Cross-site scripting | |
| 18. |
The URL of the page that had the link that the user clicked to access the page is called as _____ |
| A. | Source |
| B. | Linker |
| C. | Leaker |
| D. | Referrer |
| Answer» E. | |
| 19. |
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack. |
| A. | Two-factor authentication |
| B. | Cross-site request forgery |
| C. | Cross-site scripting |
| D. | Cross-site scoring scripting |
| Answer» D. Cross-site scoring scripting | |
| 20. |
An attack on a website that stores and displays text to a user is known as ______ attack |
| A. | SQL attack |
| B. | XSS attack |
| C. | XRP attack |
| D. | None of the mentioned |
| Answer» C. XRP attack | |
| 21. |
If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________ |
| A. | SQL attacks |
| B. | SQL injection attacks |
| C. | SQL usage attack |
| D. | SQL destroyer attack |
| Answer» C. SQL usage attack | |