Get Database Security for Cyber Professionals Certificate from The Digital Adda which you can share in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.
Exam Details
- Format: Multiple Choice Question
- Questions: 10
- Passing Score: 8/10 or 80%
- Language: English
Database Security for Cyber Professionals Certification
- Define the concept of database security
- Identify the various types of database inferences attacks
- Outline the various kind of emerging technologies in database security
- Discuss the process of building MySQL Security Lab
- Analyze the architecture and exploits of MySQL
- Discuss the concepts of oracle databases exploitation and audit configuration
- Recognize the best practices of database security
- Examine the architecture of PostgreSQL
- Summarize the notion of platform hardening
Here are 100% correct answers :
Which of the following IS the second most common target for hackers? Choose one answer.
Stolen credentials
File servers
Databases
All of the above
Which of the following activities can be performed by the attacker via SQL injection? Choose two answers.
Secure the database
Modify data in the database
Gain access to resources
None of the above
Which of the following is not an example of inference vulnerabilities in databases? Choose one answer.
Data Aggregation
Data Isolation
Data Association
Data Science
Arrange the following steps in securing a database according to their appropriate sequence
Encrypt Data, Prevent Unauthorized Data Access, Detect Alert on Database Activity.
Prevent Unauthorized Data Access, Detect Alert on Database Activity, Encrypt Data
Detect Alert on Database Activity, Encrypt Data, Prevent Unauthorized Data Access
None of the above
True or False: Homomorphic encryption enables certain types of computations to be performed on the ciphertext.
True
False
A baseline security check provides information about missing __ measures.
data
Two-way data binding
Binding view to controller
Security
Which of the following tasks is performed by the MySQL workbench? Choose one answer.
Management
Administrative
Supervisor
Team Lead
Which of the following are not the fields in a MySQL base user table?
password
username
privileges
location
The Oracle Listener receives _ and routes them to various services.
get
requests
post
method
Database-wide privileges and object-level privileges are the two fundamental levels of privileges defined by Oracle.
True
False