

MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Rdbms knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following is a valid encryption technique? |
A. | Parallel key encryption |
B. | Public key encryption |
C. | Systematic key encryption |
D. | All of the mentioned |
Answer» C. Systematic key encryption | |
2. |
A log of all changes to the application data is called as __________ |
A. | Audit trail |
B. | Audit log |
C. | Audit lead |
D. | Data log |
Answer» B. Audit log | |
3. |
________________ALLOWS_A_SYSTEM_ADMINISTRATOR_TO_ASSOCIATE_A_FUNCTION_WITH_A_RELATION;_THE_FUNCTION_RETURNS_A_PREDICATE_THAT_MUST_BE_ADDED_TO_ANY_QUERY_THAT_USES_THE_RELATION.?$ |
A. | OpenID |
B. | Single-site system |
C. | Security Assertion Markup Language (SAML) |
D. | Virtual Private Database (VPD) |
Answer» E. | |
4. |
A_LOG_OF_ALL_CHANGES_TO_THE_APPLICATION_DATA_IS_CALLED_AS___________?$ |
A. | Audit trail |
B. | Audit log |
C. | Audit lead |
D. | Data log |
Answer» B. Audit log | |
5. |
VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism.$ |
A. | Row-level authorization |
B. | Column-level authentication |
C. | Row-type authentication |
D. | Authorization security |
Answer» B. Column-level authentication | |
6. |
Which_of_the_following_is_a_valid_encryption_technique?$ |
A. | Parallel key encryption |
B. | Public key encryption |
C. | Systematic key encryption |
D. | All of the mentioned |
Answer» C. Systematic key encryption | |
7. |
The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years? |
A. | OpenID |
B. | Single-site system |
C. | Security Assertion Markup Language (SAML) |
D. | Virtual Private Database (VPD) |
Answer» B. Single-site system | |
8. |
What is the standard for exchanging authentication and authorization information between two different security domains? |
A. | SABM |
B. | STML |
C. | SPTA |
D. | SAML |
Answer» E. | |
9. |
The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on. |
A. | OpenID |
B. | Sign-on system |
C. | Security Assertion Markup Language (SAML) |
D. | Virtual Private Database (VPD) |
Answer» D. Virtual Private Database (VPD) | |
10. |
What are phishing attacks? |
A. | Users are forced to use a second server which causes the attack |
B. | Users are forced to divert to a fake site where the attack takes place |
C. | Users are fooled by similar GUI and data is extracted from them. |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
11. |
A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.$ |
A. | OpenID |
B. | Sign-on system |
C. | Security Assertion Markup Language (SAML) |
D. | Virtual Private Database (VPD) |
Answer» C. Security Assertion Markup Language (SAML) | |
12. |
What are man in the middle attacks? |
A. | Users are forced to use a second server which causes the attack |
B. | Users are forced to divert to a fake site where the attack takes place |
C. | Users are fooled by similar GUI and data is extracted from them. |
D. | None of the mentioned |
Answer» C. Users are fooled by similar GUI and data is extracted from them. | |
13. |
Even with two-factor authentication, users may still be vulnerable to_____________attacks. |
A. | Radiant |
B. | Cross attack |
C. | scripting |
D. | Man-in-the-middle |
Answer» E. | |
14. |
The system where two independent pieces of data are used to identify a user is called as ______ |
A. | Two system authentication |
B. | ID password authentication |
C. | Two factor authentication |
D. | Multi data authentication |
Answer» D. Multi data authentication | |
15. |
Many applications use _________________ where two independent factors are used to identify a user. |
A. | Two-factor authentication |
B. | Cross-site request forgery |
C. | Cross-site scripting |
D. | Cross-site scoring scripting |
Answer» B. Cross-site request forgery | |
16. |
State true or false: Password leakage is a major security problem |
A. | True |
B. | False |
Answer» B. False | |
17. |
_________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
A. | Two-factor authentication |
B. | Cross-site request forgery |
C. | Cross-site scripting |
D. | Cross-site scoring scripting |
Answer» C. Cross-site scripting | |
18. |
The URL of the page that had the link that the user clicked to access the page is called as _____ |
A. | Source |
B. | Linker |
C. | Leaker |
D. | Referrer |
Answer» E. | |
19. |
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack. |
A. | Two-factor authentication |
B. | Cross-site request forgery |
C. | Cross-site scripting |
D. | Cross-site scoring scripting |
Answer» D. Cross-site scoring scripting | |
20. |
An attack on a website that stores and displays text to a user is known as ______ attack |
A. | SQL attack |
B. | XSS attack |
C. | XRP attack |
D. | None of the mentioned |
Answer» C. XRP attack | |
21. |
If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________ |
A. | SQL attacks |
B. | SQL injection attacks |
C. | SQL usage attack |
D. | SQL destroyer attack |
Answer» C. SQL usage attack | |