Get Database Security for Cyber Professionals Certificate from The Digital Adda which you can share in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.
Exam Details:
- Format: Multiple Choice Question
- Questions: 10
- Passing Score: 8/10 or 80%
- Language: English
Database Security for Cyber Professionals Certification:
- Define the concept of database security
- Identify the various types of database inferences attacks
- Outline the various kind of emerging technologies in database security
- Discuss the process of building MySQL Security Lab
- Analyze the architecture and exploits of MySQL
- Discuss the concepts of oracle databases exploitation and audit configuration
- Recognize the best practices of database security
- Examine the architecture of PostgreSQL
- Summarize the notion of platform hardening
Here are 100% Correct Answers:
Question 1: Which of the following IS the second most common target for hackers? Choose one answer.
- Stolen credentials
- File servers
- Databases
- All of the above
Question 2: Which of the following activities can be performed by the attacker via SQL injection? Choose two answers.
- Secure the database
- Modify data in the database
- Gain access to resources
- None of the above
Question 3: Which of the following is not an example of inference vulnerabilities in databases? Choose one answer.
- Data Aggregation
- Data Isolation
- Data Association
- Data Science
Question 4: Arrange the following steps in securing a database according to their appropriate sequence
- Encrypt Data, Prevent Unauthorized Data Access, Detect Alert on Database Activity.
- Prevent Unauthorized Data Access, Detect Alert on Database Activity, Encrypt Data
- Detect Alert on Database Activity, Encrypt Data, Prevent Unauthorized Data Access
- None of the above
Question 5: True or False: Homomorphic encryption enables certain types of computations to be performed on the ciphertext.
- True
- False
Question 6: A baseline security check provides information about missing __ measures.
- Data
- Two-way data binding
- Binding view to controller
- Security
Question 7: Which of the following tasks is performed by the MySQL workbench? Choose one answer.
- Management
- Administrative
- Supervisor
- Team Lead
Question 8: Which of the following are not the fields in a MySQL base user table?
- password
- username
- privileges
- location
Question 9: The Oracle Listener receives _ and routes them to various services.
- get
- requests
- post
- method
Question 10: Database-wide privileges and object-level privileges are the two fundamental levels of privileges defined by Oracle.
- True
- False