0% found this document useful (0 votes)
126 views5 pages

DBS Question Bank

Very important

Uploaded by

beinggood1810
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
126 views5 pages

DBS Question Bank

Very important

Uploaded by

beinggood1810
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

26/10/2024, 12:23 2022_U111_CY20505_Question Bank

S.NO UNIT CHAP. PART Q.TYPE QUESTION CO KL QL MARK

1 1 1 A DESC CO1 U M 2
What is database security? Extend its challenges.

2 1 1 A DESC List down the components of information security. CO1 R E 2


3 1 1 A DESC Classify the CIA rules in database security. CO1 U M 2
4 1 1 A DESC Distinguish information security and operating system security. CO1 An D 2
5 1 1 A DESC Compare data and information. CO1 U E 2
6 1 1 A DESC Examine information security and information system. CO1 An D 2
7 1 1 A DESC Model the typical use of system application in management level. CO1 Ap M 2
8 1 1 A DESC Identify the categories of information security. CO1 Ap D 2
9 1 1 A DESC CO1 U E 2
Outline vulnerabilities and threats.

10 1 1 A DESC What is the need of access point? CO1 R E 2


11 1 1 A DESC Distinguish authentication and authorization with example. CO1 An D 2
12 1 1 A DESC List down the components of operating system. CO1 R E 2
13 1 1 A DESC Illustrate the characteristics of information security. CO1 U M 2
14 1 1 A DESC Classify the asset types and values. CO1 U E 2
15 1 1 A DESC Show the types of security risks. CO1 R E 2
16 1 1 A DESC How system vulnerabilities impact business? CO1 R D 2
17 1 1 A DESC Why it is important to protect the operating system? CO1 R E 2
18 1 1 A DESC Extend the security feature authentication and its types. CO1 U M 2
19 1 1 A DESC Interpret whether FTP clients and servers encrypt all transmitted data. CO1 U D 2
20 1 1 A DESC Identify any three examples of people threats. CO1 Ap M 2
21 1 1 A DESC Show the integrity violation process. CO1 U E 2
22 1 1 A DESC Choose an example for natural disaster threat with its definition. CO1 Ap D 2
23 1 1 A DESC Demonstrate any three methods to protect your operating system . CO1 U M 2
24 1 1 A DESC Categorize password policies and explain some example policies. CO1 An D 2
25 1 1 A DESC Construct an example of how you can prevent physical access to an application database server. CO1 Ap M 2
26 1 1 B DESC Outline the components of information security architecture with neat diagram for protecting logical and physical assets. CO1 U M 12
27 1 1 B DESC Illustrate operating system security breaches and their remedies. CO1 U E 12
28 1 1 B DESC Develop the framework for information security with the implementation of CIA triangle. CO1 Ap M 6
29 1 1 B DESC Extend the vulnerability types with an example for each type. CO1 U M 6
30 1 1 B DESC Illustrate the authentication process to verify the identity of the user to permit access to the operating system. Outline its various methods in detail. CO1 U M 8
31 1 1 B DESC Build the various types of information assets and their values. CO1 Ap M 4
32 1 1 B DESC Analyze the process of how E-mail security can be done. CO1 An D 6
33 1 1 B DESC Construct the categories of database security threats. CO1 Ap E 6
34 1 1 C DESC Demonstrate the various security methods used to protect database environment components. CO1 U M 8
35 1 1 C DESC Interpret the integrity violation process of information security. CO1 U M 5
36 1 1 C DESC Develop the flowchart to illustrate the following. A)Database security access point. B)Data integrity violation process. CO1 Ap E 6
37 1 1 C DESC Extend the characteristics of information system categories with examples. CO1 U E 7
38 1 1 C DESC Suppose you were hired as a system administrator for a small company. On your first day of work, you are asked by a developer to configure a secure CO1 Ap D 6
e-mail server on one of the systems. Construct the steps that you would take in response to this request.
39 1 1 C DESC Assume you are a security officer. You have been assigned to guard a back entrance checkpoint. One day, a well-known manager walks out with a box CO1 An D 13
of papers. A day later you are summoned to the security office by your manager and the security director for questioning about the manager who had
been terminated the day before. The manager walked out with highly confidential information. Analyze what types of security measures were violated
and how to avoid those violations.

peccoe.paavai.edu.in/apps/examportal/admin/PrintQuestions.php?q=MjAyMnx8VTExMXx8Q1kyMDUwNQ== 1/5
26/10/2024, 12:23 2022_U111_CY20505_Question Bank

40 1 1 C DESC Summarize in detail about the components of operating system security environment. CO1 U M 7
41 1 1 C DESC Demonstrate all the password policies and outline the vulnerabilities in user administration. CO1 U E 7
42 1 1 C DESC Organize the list of five system administration best policies for any two operating systems. CO1 Ap M 6
43 2 2 A DESC How do you create a new user in SQL server? CO2 R M 2
44 2 2 A DESC CO2 R E 2
What is the role of authentication in user administration?

45 2 2 A DESC Distinguish the commands for removing and modifying users in a database system. CO2 An M 2
46 2 2 A DESC Extend the types of users in SQL server. CO2 U D 2
47 2 2 A DESC Identify the best practices for administrators when managing users and profiles. CO2 Ap M 2
48 2 2 A DESC Analyze the importance of password policies in database security. CO2 An D 2
49 2 2 A DESC Select the query for database administrator to revoke a specific user’s privileges. CO2 Ap M 2
50 2 2 A DESC Show the syntax to create the users in SQL server. CO2 U M 2
51 2 2 A DESC Compare SQL server handling of user authentication and authorization. CO2 U D 2
52 2 2 A DESC Interpret the purpose of password policies in user administration. CO2 U M 2
53 2 2 A DESC Extend database links and their importance. CO2 U D 2
54 2 2 A DESC Show the examples for strong and weak password. CO2 U E 2
55 2 2 A DESC Illustrate the significance of documentation in an organization. CO2 U M 2
56 2 2 A DESC Name the default user in a database. CO2 R E 2
57 2 2 A DESC Demonstrate the necessity of QUOTA clause when creating users. CO2 U E 2
58 2 2 A DESC Identify the purpose of assigning different privileges to users in a database system. CO2 Ap D 2
59 2 2 A DESC What is privilege? Demonstrate its types. CO2 R E 2
60 2 2 A DESC Classify the types of profiles with example. CO2 U M 2
61 2 2 A DESC Develop an SQL query to make expire the password of user "Sam". CO2 Ap D 2
62 2 2 A DESC Find the use of disk admin. CO2 R M 2
63 2 2 A DESC Construct the syntax for grant and revoke in SQL. CO2 Ap E 2
64 2 2 A DESC Categorize the password parameters with their purpose. CO2 An D 2
65 2 2 A DESC CO2 Ap M 2
Model the user creation in Oracle with example queries.

66 2 2 A DESC Apply the resource parameter constraints for user creation. CO2 Ap D 2
67 2 2 A DESC Recall the syntax for creating global user with example. CO2 R M 2
68 2 2 B DESC Build the steps to create and implement password policies in Oracle. CO2 Ap M 12
69 2 2 B DESC Illustrate in detail the best practices for administrators and managers. CO2 U E 12
70 2 2 B DESC Construct a series of steps to demonstrate the security risk when using an Oracle database link. CO2 Ap M 8
71 2 2 B DESC Develop the syntax and commands to create and modify a profile in Oracle 10g. CO2 Ap M 4
72 2 2 B DESC Summarize the components involved in linked servers and remote servers. CO2 U M 6
73 2 2 B DESC Model the authentication methods for connecting to Oracle 10g databases using database link mechanisms. CO2 Ap M 6
74 2 2 B DESC A lead developer called you to lock an account. Outline the steps that you would take to comply with the request. CO2 U D 6
75 2 2 B DESC You were hired as an Oracle DBA to work with a team of developers. On your first day, the project lead expressed his concerns about security aspect of CO2 An E 6
application. Analyze the implemention of a suited security policy.
76 2 2 C DESC Elaborate the process for granting and revoking user privileges with suitable examples. CO2 U M 13
77 2 2 C DESC Demonstrate all the privileges in SQL server with example queries. CO2 U M 13
78 2 2 C DESC Outline the steps required to create an oracle 10g user using database authentication. CO2 U E 8
79 2 2 C DESC Construct the queries used to modify the created users in Oracle and SQL server. CO2 Ap E 5
80 2 2 C DESC Outline the steps to design and implement password policies used in SQL server. CO2 U D 8
81 2 2 C DESC CO2 Ap D 5
Construct an SQL statement that gives user U1 the select privilege on branch table and allows U1 to grant this privilege to others.

peccoe.paavai.edu.in/apps/examportal/admin/PrintQuestions.php?q=MjAyMnx8VTExMXx8Q1kyMDUwNQ== 2/5
26/10/2024, 12:23 2022_U111_CY20505_Question Bank

82 2 2 C DESC Examine creating roles, assigning and revoking user roles in Oracle and SQL server. CO2 An M 7
83 2 2 C DESC Demonstrate in detail the use of the DENY statement in SQL Server with example. CO2 U E 6
84 3 3 A DESC Define virtual data base. List its advantages. CO3 R M 2
85 3 3 A DESC Categorize the types of users. CO3 An E 2
86 3 3 A DESC Infer on security models. CO3 U M 2
87 3 3 A DESC Classify the application types. CO3 An D 2
88 3 3 A DESC Illustrate the components of web application. CO3 U E 2
89 3 3 A DESC Extend the data warehouse application. CO3 U D 2
90 3 3 A DESC List the application security models. CO3 R M 2
91 3 3 A DESC Show the physical structure of web application. CO3 U D 2
92 3 3 A DESC List the characteristics of security data model based on application roles. CO3 R E 2
93 3 3 A DESC Summarize the architecture of security data model based on database roles. CO3 U E 2
94 3 3 A DESC Analyze the characteristics of security data model based on application tables. CO3 An D 2
95 3 3 A DESC Illustrate the data model for small pharmacy store. CO3 U E 2
96 3 3 A DESC Interpret the data encryption process. CO3 U M 2
97 3 3 A DESC What are the steps to create an Application role using SQL server enterprise manager? CO3 R E 2
98 3 3 A DESC Outline the steps to drop an Application table using SQL server enterprise manager. CO3 U E 2
99 3 3 A DESC List the characteristics of security data model based on application functions. CO3 R D 2
100 3 3 A DESC Construct VPD using views. CO3 Ap E 2
101 3 3 A DESC Categorize the VPD policies. CO3 An M 2
102 3 3 A DESC Develop the command to display and hide current user in SQL using Oracle. CO3 Ap D 2
103 3 3 A DESC Illustrate the implementation of policy manager. CO3 U M 2
104 3 3 A DESC Show the encryption process using private and public keys. CO3 U E 2
105 3 3 A DESC Distinguish the security related characteristics of client-server and web applications. CO3 An D 2
106 3 3 A DESC Interpret proxy user with its appropriate use. CO3 U M 2
107 3 3 A DESC Compare database roles and application roles. CO3 An D 2
108 3 3 A DESC Build a query to create role and assign to the user 'sam'. CO3 Ap M 2
109 3 3 B DESC Illustrate how the oracle helps in implementing VPD using views. CO3 U M 12
110 3 3 B DESC Implement a function based security model for the pharmacy database. CO3 U E 12
111 3 3 B DESC Summarize in detail about security data model based on application roles with appropriate diagrams. CO3 U M 6
112 3 3 B DESC Show in detail about security data model based on application tables with appropriate diagrams. CO3 U M 6
113 3 3 B DESC Outline the concept of Virtual Private Database in detail. CO3 U M 8
114 3 3 B DESC Construct the code to implement Row and Column level Security with SQL Server. CO3 Ap M 4
115 3 3 B DESC Develop the implementation of VPD using application context in Oracle. CO3 Ap D 6
116 3 3 B DESC Build the implementation of Oracle virtual database and explain its architecture. CO3 Ap E 6
117 3 3 C DESC Explain VPD policy viewing and application context using data dictionary. CO3 U M 8
118 3 3 C DESC Design a column level security model on the employee database using access level control. CO3 Ap M 5
119 3 3 C DESC Categorize the types of users. CO3 An E 7
120 3 3 C DESC Compare the characteristics of security models. CO3 An E 6
121 3 3 C DESC Classify the common USERENV namespaces with attributes. CO3 U D 6
122 3 3 C DESC Show the architecture of Oracle VPD feature with the components. CO3 U D 7
123 3 3 C DESC Construct the implementation of VPD policies and application context using the data dictionary. CO3 Ap M 13
124 3 3 C DESC Develop the implementation of VPD policies and application context using policy manager. CO3 Ap E 7
125 3 3 C DESC Build the commands to create two application context attributes and verify the creation of the attributes by viewing the data dictionary views. CO3 Ap M 6
126 4 4 A DESC CO4 R M 2
What is the need of auditing database?

peccoe.paavai.edu.in/apps/examportal/admin/PrintQuestions.php?q=MjAyMnx8VTExMXx8Q1kyMDUwNQ== 3/5
26/10/2024, 12:23 2022_U111_CY20505_Question Bank

127 4 4 A DESC CO4 R M 2


Why the server activity should be audited?

128 4 4 A DESC CO4 R D 2


What is the difference between Oracle and sql server 2000 in auditing database?

129 4 4 A DESC CO4 Ap E 2


Develop the code to create a trigger using Oracle.

130 4 4 A DESC CO4 An D 2


Examine the advantages of DLL trigger over other triggers in Oracle.

131 4 4 A DESC CO4 U D 2


Infer how auditing is done with simple case study.

132 4 4 A DESC CO4 U E 2


Differentiate internal and external auditing.

133 4 4 A DESC CO4 U E 2


Show the diagrammatic representation of various phases of an auditing process.

134 4 4 A DESC CO4 U E 2


Extend the need of auditing database activities.

135 4 4 A DESC CO4 Ap M 2


Identify the purpose of audit log.

136 4 4 A DESC CO4 U D 2


Illustrate the purpose of sql server trace option for security audit selection.

137 4 4 A DESC CO4 Ap E 2


Organize the three types of operations involved with database activities.

138 4 4 A DESC CO4 An M 2


Classify the database events.

139 4 4 A DESC CO4 U D 2


Show the audit command syntax diagram.

140 4 4 A DESC CO4 Ap M 2


Construct a query to audit for alter previlege.

141 4 4 A DESC CO4 Ap E 2


Construct a query to audit for insert previlege.

142 4 4 A DESC CO4 An D 2


Analyze the audit data dictionary views.

143 4 4 A DESC CO4 An D 2


Examine the use of sql profiler tool.

144 4 4 B DESC CO4 U M 12


Outline the auditing of Oracle database activities.

145 4 4 B DESC CO4 U M 6


Illustrate the DLL trigger execution to secure a database with example.

146 4 4 B DESC CO4 U M 8


Discuss in detail the security auditing process with sql server.

peccoe.paavai.edu.in/apps/examportal/admin/PrintQuestions.php?q=MjAyMnx8VTExMXx8Q1kyMDUwNQ== 4/5
26/10/2024, 12:23 2022_U111_CY20505_Question Bank

147 4 4 B DESC CO4 U D 8


Discuss in detail the auditing database activities with Oracle.

148 4 4 B DESC CO4 Ap E 4


Develop the steps for determining the location of the audit trail records for both Oracle and sql server.

149 4 4 C DESC CO4 U M 6


Demonstrate the purpose of the Oracle alert file.

150 4 4 C DESC CO4 An E 13


The database administrator needs to capture all LOGON and LOGOFF activities to analyze database connectivity. Organize the steps to follow for this
business requirement.

151 4 4 C DESC CO4 Ap M 6


Construct a trigger that prevents DBSEC from altering any of its tables.

152 4 4 C DESC CO4 Ap D 13


Build the auditing code with Oracle to track all statements issued against a table and to store all auditing records in an auditing table.

153 4 4 C DESC CO4 U M 7


Summarize the implementation of sql profiler tool to provide user interface for auditing events.

154 4 4 C DESC CO4 U E 7


Demonstrate the tracing for database errors auditing with sql server.

peccoe.paavai.edu.in/apps/examportal/admin/PrintQuestions.php?q=MjAyMnx8VTExMXx8Q1kyMDUwNQ== 5/5

You might also like