Sie sind auf Seite 1von 6

15CS338E-DATABASE SECURITY AND PRIVACY

Security Architecture: Introduction, Information Systems, Database


Management Systems, Information Security Architecture, Database Security–
Asset Types and value, Security Methods, Introduction-Operating System
,Overview, Security Environment – Components, Authentication Methods, User
Administration-Password Policies Vulnerabilities-E-mail Security.

1. ...................... is a set of processes and procedures that transform


data into information and knowledge.
A. Information system
B. Knowledge system
C. Database system
D. Computer system
Answer A

2. In a typical ................ network, application processing is shared


between clients and one more servers.
A. Client server computing
B. Cloud computing
C. Mobile computing
D. Data computing
Answer A

3. The .................... is defined as a set of activities performed across


the organization creating as output of value to the customer.
A. Development process
B. Business process
C. Quality process
D. Customer focus
Answer B

4. Management information systems (MIS)


A. Create and share documents that support day-today office activities
B. Process business transactions (e.g., time cards, payments, orders, etc.)
C. Capture and reproduce the knowledge of an expert problem solver
D. Use the transaction data to produce information needed by managers to
run the business
Answer D

5. Which of the following is NOT an objective of MIS?


A. Facilitate the decisions-making process
B. Provide requisite information at each level of management
C. Support decision-making
D. Recruit people for system
Answer D

6. In MIS system design, the sources of information may be


categorized as ............... and ...............
A. Useful, Non useful
B. Personal, Organizational
C. Internal, External
D. Constructive, Destructive
Answer C

7. A Transaction processing system:


A. Processes a low volume of business transactions.
B. Supports single users in routine, everyday transactions.
C. Uses relatively simple procedures to control processing and to
ensure accuracy.
D. use a combination of IT and manual procedures.
Answer C

8. In TPS systems, an output that signifies that a specific transaction


has taken place is called a(n):
A. Action document.
B. Detail report.
C. Exception report.
D. summary report.
Answer A

9. An expert system is
A. a computer that can answer questions like a human expert
B. a group of scientists who design computer programs
C. a method of producing new words
D. a computer that can feel emotions.
Answer A

10. _____ are knowledge based system to which present rules are applied
to solve a particular problem.
A. Expert System
B. Artificial Intelligence
C. Knowledge Base System
D. Base rule 0
Answer A

11. What is ACID properties of Transactions?


A. Atomicity, Consistency, Isolation, Database
B. Atomicity, Consistency, Isolation, Durability
C. Atomicity, Consistency, Inconsistent, Durability
D. Automatically, Concurrency, Isolation, Durability
Answer B

12. Which of the following information systems allows people who are
not together to work as a group is called:
A. Decision support system.
B. Transaction processing system.
C. Group support system.
D. Management information system.
Answer C

13. Decision makers who are concerned with tactical (short-term)


operational problems and decision making are
A. Supervisors
B. Executive managers
C. Middle managers
D. Mobile managers
Answer C

14. The majority of publically available Internet information sources


are:
A. Created in XML.
B. Structured information.
C. Normal information.
D. Unstructured information.
Answer D

15. Which of the following are the main software components of DSS?
(i) Database Management System (DBMS)
(ii)model management system (iii) support tools (iv) internet
A. Only i, ii, and iii
B. Only ii, iii and iv
C. Only i, iii and iv
D. All i, ii, iii, and iv
Answer A

16. Information systems that support the business functions that reach
out to suppliers are known as:
A. Expert information systems
B. Decision support systems
C. Back office information systems
D. Front office information systems
Answer A

17. __________________ is collection of interrelated data and set of


program to access them.
A. Data Structure
B. Database
C. Programming language
D. Database Management System
Answer D

18. The DBMS acts as an interface between what two components of an


database system ?
A. Database Application and Database
B. Data and Database
C. Database and User
D. Database and SQL
Answer A

19. ___________ enforce and implement data security policies and


procedures on data base levels.
A. Database designer
B. Database analyst
C. Database Administrator
D. Database manager
Answer C

20. A user that manages the files of application in DBMS is called as __


A. Administrator
B. Database analyst
C. File Manager
D. System Architect
Answer C

21. Database locking concept is used to solve the problem of ___________


A. Lost Update
B. Uncommitted Dependency
C. Inconsistent Data
D. All of the above
Answer D

22. _______ is the practice and precautions taken to protect valuable


information from unauthorised access, recording, disclosure or
destruction.
A. Network Security
B. Database Security
C. Information Security
D. Physical Security
Answer C

23. Which of them is not a threat to information security?


A. Disaster
B. Eavesdropping
C. Information leakage
D. Unchanged default password
Answer D

24. Compromising confidential information comes under _________


A. Bug
B. Threat
C. Vulnerability
D. Attack
Answer B.

25. ______ means the protection of data from modification by unknown


users.
A. Confidentiality
B. Integrity
C. Authentication
D. Non-repudiation
Answer B

26. _______ of information means, only authorized users are capable of


accessing the information.
A. Confidentiality
B. Integrity
C. Non-repudiation
D. Availability
Answer D

Das könnte Ihnen auch gefallen