DBS Question Bank
DBS Question Bank
1 1 1 A DESC CO1 U M 2
What is database security? Extend its challenges.
peccoe.paavai.edu.in/apps/examportal/admin/PrintQuestions.php?q=MjAyMnx8VTExMXx8Q1kyMDUwNQ== 1/5
26/10/2024, 12:23 2022_U111_CY20505_Question Bank
40 1 1 C DESC Summarize in detail about the components of operating system security environment. CO1 U M 7
41 1 1 C DESC Demonstrate all the password policies and outline the vulnerabilities in user administration. CO1 U E 7
42 1 1 C DESC Organize the list of five system administration best policies for any two operating systems. CO1 Ap M 6
43 2 2 A DESC How do you create a new user in SQL server? CO2 R M 2
44 2 2 A DESC CO2 R E 2
What is the role of authentication in user administration?
45 2 2 A DESC Distinguish the commands for removing and modifying users in a database system. CO2 An M 2
46 2 2 A DESC Extend the types of users in SQL server. CO2 U D 2
47 2 2 A DESC Identify the best practices for administrators when managing users and profiles. CO2 Ap M 2
48 2 2 A DESC Analyze the importance of password policies in database security. CO2 An D 2
49 2 2 A DESC Select the query for database administrator to revoke a specific user’s privileges. CO2 Ap M 2
50 2 2 A DESC Show the syntax to create the users in SQL server. CO2 U M 2
51 2 2 A DESC Compare SQL server handling of user authentication and authorization. CO2 U D 2
52 2 2 A DESC Interpret the purpose of password policies in user administration. CO2 U M 2
53 2 2 A DESC Extend database links and their importance. CO2 U D 2
54 2 2 A DESC Show the examples for strong and weak password. CO2 U E 2
55 2 2 A DESC Illustrate the significance of documentation in an organization. CO2 U M 2
56 2 2 A DESC Name the default user in a database. CO2 R E 2
57 2 2 A DESC Demonstrate the necessity of QUOTA clause when creating users. CO2 U E 2
58 2 2 A DESC Identify the purpose of assigning different privileges to users in a database system. CO2 Ap D 2
59 2 2 A DESC What is privilege? Demonstrate its types. CO2 R E 2
60 2 2 A DESC Classify the types of profiles with example. CO2 U M 2
61 2 2 A DESC Develop an SQL query to make expire the password of user "Sam". CO2 Ap D 2
62 2 2 A DESC Find the use of disk admin. CO2 R M 2
63 2 2 A DESC Construct the syntax for grant and revoke in SQL. CO2 Ap E 2
64 2 2 A DESC Categorize the password parameters with their purpose. CO2 An D 2
65 2 2 A DESC CO2 Ap M 2
Model the user creation in Oracle with example queries.
66 2 2 A DESC Apply the resource parameter constraints for user creation. CO2 Ap D 2
67 2 2 A DESC Recall the syntax for creating global user with example. CO2 R M 2
68 2 2 B DESC Build the steps to create and implement password policies in Oracle. CO2 Ap M 12
69 2 2 B DESC Illustrate in detail the best practices for administrators and managers. CO2 U E 12
70 2 2 B DESC Construct a series of steps to demonstrate the security risk when using an Oracle database link. CO2 Ap M 8
71 2 2 B DESC Develop the syntax and commands to create and modify a profile in Oracle 10g. CO2 Ap M 4
72 2 2 B DESC Summarize the components involved in linked servers and remote servers. CO2 U M 6
73 2 2 B DESC Model the authentication methods for connecting to Oracle 10g databases using database link mechanisms. CO2 Ap M 6
74 2 2 B DESC A lead developer called you to lock an account. Outline the steps that you would take to comply with the request. CO2 U D 6
75 2 2 B DESC You were hired as an Oracle DBA to work with a team of developers. On your first day, the project lead expressed his concerns about security aspect of CO2 An E 6
application. Analyze the implemention of a suited security policy.
76 2 2 C DESC Elaborate the process for granting and revoking user privileges with suitable examples. CO2 U M 13
77 2 2 C DESC Demonstrate all the privileges in SQL server with example queries. CO2 U M 13
78 2 2 C DESC Outline the steps required to create an oracle 10g user using database authentication. CO2 U E 8
79 2 2 C DESC Construct the queries used to modify the created users in Oracle and SQL server. CO2 Ap E 5
80 2 2 C DESC Outline the steps to design and implement password policies used in SQL server. CO2 U D 8
81 2 2 C DESC CO2 Ap D 5
Construct an SQL statement that gives user U1 the select privilege on branch table and allows U1 to grant this privilege to others.
peccoe.paavai.edu.in/apps/examportal/admin/PrintQuestions.php?q=MjAyMnx8VTExMXx8Q1kyMDUwNQ== 2/5
26/10/2024, 12:23 2022_U111_CY20505_Question Bank
82 2 2 C DESC Examine creating roles, assigning and revoking user roles in Oracle and SQL server. CO2 An M 7
83 2 2 C DESC Demonstrate in detail the use of the DENY statement in SQL Server with example. CO2 U E 6
84 3 3 A DESC Define virtual data base. List its advantages. CO3 R M 2
85 3 3 A DESC Categorize the types of users. CO3 An E 2
86 3 3 A DESC Infer on security models. CO3 U M 2
87 3 3 A DESC Classify the application types. CO3 An D 2
88 3 3 A DESC Illustrate the components of web application. CO3 U E 2
89 3 3 A DESC Extend the data warehouse application. CO3 U D 2
90 3 3 A DESC List the application security models. CO3 R M 2
91 3 3 A DESC Show the physical structure of web application. CO3 U D 2
92 3 3 A DESC List the characteristics of security data model based on application roles. CO3 R E 2
93 3 3 A DESC Summarize the architecture of security data model based on database roles. CO3 U E 2
94 3 3 A DESC Analyze the characteristics of security data model based on application tables. CO3 An D 2
95 3 3 A DESC Illustrate the data model for small pharmacy store. CO3 U E 2
96 3 3 A DESC Interpret the data encryption process. CO3 U M 2
97 3 3 A DESC What are the steps to create an Application role using SQL server enterprise manager? CO3 R E 2
98 3 3 A DESC Outline the steps to drop an Application table using SQL server enterprise manager. CO3 U E 2
99 3 3 A DESC List the characteristics of security data model based on application functions. CO3 R D 2
100 3 3 A DESC Construct VPD using views. CO3 Ap E 2
101 3 3 A DESC Categorize the VPD policies. CO3 An M 2
102 3 3 A DESC Develop the command to display and hide current user in SQL using Oracle. CO3 Ap D 2
103 3 3 A DESC Illustrate the implementation of policy manager. CO3 U M 2
104 3 3 A DESC Show the encryption process using private and public keys. CO3 U E 2
105 3 3 A DESC Distinguish the security related characteristics of client-server and web applications. CO3 An D 2
106 3 3 A DESC Interpret proxy user with its appropriate use. CO3 U M 2
107 3 3 A DESC Compare database roles and application roles. CO3 An D 2
108 3 3 A DESC Build a query to create role and assign to the user 'sam'. CO3 Ap M 2
109 3 3 B DESC Illustrate how the oracle helps in implementing VPD using views. CO3 U M 12
110 3 3 B DESC Implement a function based security model for the pharmacy database. CO3 U E 12
111 3 3 B DESC Summarize in detail about security data model based on application roles with appropriate diagrams. CO3 U M 6
112 3 3 B DESC Show in detail about security data model based on application tables with appropriate diagrams. CO3 U M 6
113 3 3 B DESC Outline the concept of Virtual Private Database in detail. CO3 U M 8
114 3 3 B DESC Construct the code to implement Row and Column level Security with SQL Server. CO3 Ap M 4
115 3 3 B DESC Develop the implementation of VPD using application context in Oracle. CO3 Ap D 6
116 3 3 B DESC Build the implementation of Oracle virtual database and explain its architecture. CO3 Ap E 6
117 3 3 C DESC Explain VPD policy viewing and application context using data dictionary. CO3 U M 8
118 3 3 C DESC Design a column level security model on the employee database using access level control. CO3 Ap M 5
119 3 3 C DESC Categorize the types of users. CO3 An E 7
120 3 3 C DESC Compare the characteristics of security models. CO3 An E 6
121 3 3 C DESC Classify the common USERENV namespaces with attributes. CO3 U D 6
122 3 3 C DESC Show the architecture of Oracle VPD feature with the components. CO3 U D 7
123 3 3 C DESC Construct the implementation of VPD policies and application context using the data dictionary. CO3 Ap M 13
124 3 3 C DESC Develop the implementation of VPD policies and application context using policy manager. CO3 Ap E 7
125 3 3 C DESC Build the commands to create two application context attributes and verify the creation of the attributes by viewing the data dictionary views. CO3 Ap M 6
126 4 4 A DESC CO4 R M 2
What is the need of auditing database?
peccoe.paavai.edu.in/apps/examportal/admin/PrintQuestions.php?q=MjAyMnx8VTExMXx8Q1kyMDUwNQ== 3/5
26/10/2024, 12:23 2022_U111_CY20505_Question Bank
peccoe.paavai.edu.in/apps/examportal/admin/PrintQuestions.php?q=MjAyMnx8VTExMXx8Q1kyMDUwNQ== 4/5
26/10/2024, 12:23 2022_U111_CY20505_Question Bank
peccoe.paavai.edu.in/apps/examportal/admin/PrintQuestions.php?q=MjAyMnx8VTExMXx8Q1kyMDUwNQ== 5/5