Operating System and Database Security - Answers

  • USD
    • RUB
    • USD
    • EUR
Affiliates: 0,3 $how to earn
i agree with "Terms for Customers"
Uploaded: 01.04.2024
Content: Ответы - Безопасность операционных систем и баз данных - СИНРЕГИЯ.docx 19,94 kB
Uplense seller information
offlineAsk a question

Seller will give you a gift certificate in the amount of 0.08 $ for a positive review

Product description

Operating System and Database Security - Answers


Ready answers to the test Security of operating systems and databases.
Educational institution: SYNERGY, MY, MIT.
Delivery: fresh.
The result of passing is 95-100 points.
Below you can find questions on the Security of Operating Systems and Databases test.

QUESTIONS FOR THE TEST:
Loss of data integrity leads to...

The role of the real (working with objects) subject is played by...

The periodic procedure for obtaining a copy of the database is...

Corporate integrity constraints...

For a Linux system, the minimum password length must be ... characters

To enable users to perform tasks that fall within the scope of their job responsibilities, they are provided with...

Loss of data confidentiality leads to...

DirectAccess technology is used for...

The ticket that Kerberos issues has a typical expiration date...

The concept of “identification” assumes that...

For recovery log files, Oracle recommends using a RAID level...

The highest level of information protection is achieved when implementing...

Database protection covers...

A potential threat in the loading HTML page could be...

The Oracle Advanced Security (OAS) feature of the Oracle database management system (DBMS) is...

The concept of "implied trust" suggests that...

Disabling the access channel leads to...

The concept of “threshold value” assumes that...

When implementing the concept of building a security system based on a centralized administration scheme, the user...

Applying protection mechanisms to specific applications, such as FTP and Telnet servers, provides a firewall method called "..."

Maintaining two identical (mirror) copies of data on different disks is typical for the RAID array level...

The dynamic result of one or more relational operations on a basic relationship to create some other relationship is...

Interception of all messages entering and leaving the network provides a method for organizing the operation of the firewall "..."

On a Linux system, the time after which a user is automatically logged off from the system if he is inactive is determined by the variable...

AppLocker technology is used for...

Kerberos is designed for...

The Oracle Label Security (OLS) tool of the Oracle database management system (DBMS) is...

The Virtual Private Database (VPD) tool of the Oracle database management system (DBMS) is...

UNIX OS uses the "..." access model.

There is no data duplication and therefore the highest write performance for the RAID level...

For database files, Oracle recommends using a RAID level...

The concept of “disconnection” suggests that...

BitLocker technology is used for...

The Access database management system (DBMS) provides the following two groups by default: ...

The procedure for creating and maintaining a file containing information about all changes made to the database is...

The basis for data exchange on the Internet are protocols...

Analyzing each packet entering or leaving the network provides a method for organizing the operation of the firewall "..."

A secure channel protocol that provides support for strong client authentication is...

The rule when assigning privileges is that the user must receive...

Integrity of entities...

The Fine Grained Audit Control (FGAC) tool of the Oracle database management system (DBMS) is...

On Linux, to change the default password length, you need to edit the file...

The ownership of objects by the database management system (DBMS) itself in the DBMS environment is usually formalized using a special identifier “...”

In UNIX OS, the role of the nominal security principal is played by...

In UNIX OS, the role of the nominal security principal is played by...

The use of security mechanisms during the establishment of a TCP or UDP connection provides a method for organizing the work of a firewall

Feedback

0
Period
1 month 3 months 12 months
0 0 0
0 0 0
Seller will give you a gift certificate in the amount of 0.08 $ for a positive review.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at [email protected] the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.