Explore topic-wise MCQs in Rdbms.

This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Rdbms knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is a valid encryption technique?

A. Parallel key encryption
B. Public key encryption
C. Systematic key encryption
D. All of the mentioned
Answer» C. Systematic key encryption
2.

A log of all changes to the application data is called as __________

A. Audit trail
B. Audit log
C. Audit lead
D. Data log
Answer» B. Audit log
3.

________________ALLOWS_A_SYSTEM_ADMINISTRATOR_TO_ASSOCIATE_A_FUNCTION_WITH_A_RELATION;_THE_FUNCTION_RETURNS_A_PREDICATE_THAT_MUST_BE_ADDED_TO_ANY_QUERY_THAT_USES_THE_RELATION.?$

A. OpenID
B. Single-site system
C. Security Assertion Markup Language (SAML)
D. Virtual Private Database (VPD)
Answer» E.
4.

A_LOG_OF_ALL_CHANGES_TO_THE_APPLICATION_DATA_IS_CALLED_AS___________?$

A. Audit trail
B. Audit log
C. Audit lead
D. Data log
Answer» B. Audit log
5.

VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism.$

A. Row-level authorization
B. Column-level authentication
C. Row-type authentication
D. Authorization security
Answer» B. Column-level authentication
6.

Which_of_the_following_is_a_valid_encryption_technique?$

A. Parallel key encryption
B. Public key encryption
C. Systematic key encryption
D. All of the mentioned
Answer» C. Systematic key encryption
7.

The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years?

A. OpenID
B. Single-site system
C. Security Assertion Markup Language (SAML)
D. Virtual Private Database (VPD)
Answer» B. Single-site system
8.

What is the standard for exchanging authentication and authorization information between two different security domains?

A. SABM
B. STML
C. SPTA
D. SAML
Answer» E.
9.

The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.

A. OpenID
B. Sign-on system
C. Security Assertion Markup Language (SAML)
D. Virtual Private Database (VPD)
Answer» D. Virtual Private Database (VPD)
10.

What are phishing attacks?

A. Users are forced to use a second server which causes the attack
B. Users are forced to divert to a fake site where the attack takes place
C. Users are fooled by similar GUI and data is extracted from them.
D. None of the mentioned
Answer» D. None of the mentioned
11.

A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.$

A. OpenID
B. Sign-on system
C. Security Assertion Markup Language (SAML)
D. Virtual Private Database (VPD)
Answer» C. Security Assertion Markup Language (SAML)
12.

What are man in the middle attacks?

A. Users are forced to use a second server which causes the attack
B. Users are forced to divert to a fake site where the attack takes place
C. Users are fooled by similar GUI and data is extracted from them.
D. None of the mentioned
Answer» C. Users are fooled by similar GUI and data is extracted from them.
13.

Even with two-factor authentication, users may still be vulnerable to_____________attacks.

A. Radiant
B. Cross attack
C. scripting
D. Man-in-the-middle
Answer» E.
14.

The system where two independent pieces of data are used to identify a user is called as ______

A. Two system authentication
B. ID password authentication
C. Two factor authentication
D. Multi data authentication
Answer» D. Multi data authentication
15.

Many applications use _________________ where two independent factors are used to identify a user.

A. Two-factor authentication
B. Cross-site request forgery
C. Cross-site scripting
D. Cross-site scoring scripting
Answer» B. Cross-site request forgery
16.

State true or false: Password leakage is a major security problem

A. True
B. False
Answer» B. False
17.

_________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A. Two-factor authentication
B. Cross-site request forgery
C. Cross-site scripting
D. Cross-site scoring scripting
Answer» C. Cross-site scripting
18.

The URL of the page that had the link that the user clicked to access the page is called as _____

A. Source
B. Linker
C. Leaker
D. Referrer
Answer» E.
19.

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.

A. Two-factor authentication
B. Cross-site request forgery
C. Cross-site scripting
D. Cross-site scoring scripting
Answer» D. Cross-site scoring scripting
20.

An attack on a website that stores and displays text to a user is known as ______ attack

A. SQL attack
B. XSS attack
C. XRP attack
D. None of the mentioned
Answer» C. XRP attack
21.

If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________

A. SQL attacks
B. SQL injection attacks
C. SQL usage attack
D. SQL destroyer attack
Answer» C. SQL usage attack