0

DBMS Security and Authorization

Description: DBMS Security and Authorization
Number of Questions: 15
Created by:
Tags: DBMS Security and Authorization Java/Oracle /C/C++ Oracle Database Database Management System
Attempted 0/15 Correct 0 Score 0

Which type of command is GRANT?

  1. Transaction Control Language (TCL) command

  2. Data Query Language (DQL) command

  3. Data Control language (DCL) command

  4. Data Definition Language (DDL) command

  5. None of these


Correct Option: C
Explanation:

It is a Data Control Language (DCL) command.

In Oracle, which of the following is a group of privileges that are collected together and granted to users?

  1. Revoke

  2. Grant

  3. Role

  4. Synonym

  5. View


Correct Option: C
Explanation:

This statement in Oracle is a group of privileges that are collected together and granted to users.

Create, Revoke, Grant and Drop commands are parts of _____________ language in Oracle.

  1. DML

  2. DDL

  3. Object-Oriented language

  4. Procedural language

  5. Assembly language


Correct Option: B
Explanation:

Create, Revoke, Grant and Drop commands are parts of data definition language in Oracle.

Which of the following locks in Oracle locks the table allowing other users to only query but not insert, update or delete rows in a table?

  1. Share update lock

  2. Exclusive lock

  3. Share lock

  4. Deadlock

  5. Keylock


Correct Option: C
Explanation:

This type of lock in Oracle locks the table allowing other user to only query but not insert, update or delete rows in table.

Which of the following objectives of Data Distribution is achieved by having redundant fragment allocation meeting the site requirements?

  1. Availability and reliability of distributed data

  2. Processing locality

  3. Workload distribution

  4. None of these


Correct Option: B
Explanation:

The objective of Data Distribution is achieved by having redundant fragment allocation by meeting the site requirements.

A director's salary details are hidden from the employee. This process is called

  1. conceptual level hiding

  2. physical level data hiding

  3. external level data hiding

  4. none of these


Correct Option: C

In a multi-user database, if two users wish to update the same record at the same time, they are prevented by

  1. jamming

  2. password

  3. documentation

  4. record lock


Correct Option: D

What is the SQL statement to grant select, update privileges to the user RAKESH for the DEPT relation?

  1. GRANT DML on DEPT to USER1;

  2. GRANT select, update to USER1 on DEPT;

  3. GRANT select, update on DEPT to USER1;

  4. GRANT on DEPT to USER1 for select, update;


Correct Option: C
Explanation:

The SQL statement to grant select, update privileges to the user RAKESH for the DEPT relation is GRANT select, update on DEPT to USER1;

Data security threat includes

  1. privacy invasion

  2. hardware failure

  3. fraudulent manipulation of data

  4. all of above


Correct Option: A

Which are the different phases in two-phase locking protocol?

  1. Read and write phase

  2. Locking and unlocking phase

  3. Growing and shrinking phase

  4. Growing and locking phase


Correct Option: C
Explanation:

The two-phase locking protocols are:

  1. Growing phase- Here transaction may obtain lock but not able to release any lock.
  2. Shrinking phase- Here transaction may release lock but not able to obtain any lock.

A locked file can be

  1. accessed by only one user

  2. modified by user with correct password

  3. used to hide sensitive information

  4. none of these


Correct Option: A

Locking can be used for

  1. deadlock

  2. lost update

  3. uncommitted dependency

  4. inconsistent data


Correct Option: B

In an Oracle distributed database system, which of the following is the one in which each server participating in a distributed database is administered independently from all other databases?

  1. Authentication through database links

  2. Distributed database security

  3. Auditing database links

  4. Administration tools

  5. Site autonomy


Correct Option: D
Explanation:

These tools are used to manage an Oracle distributed database system. 'Site autonomy' means each server participating in a distributed database is administered independently from all other databases.

_______ lock does not permit to share the resource.

  1. Dead

  2. Nowait

  3. Exclusive

  4. Row


Correct Option: C

What type of statement is executed automatically as an event after or before modification to the database?

  1. Cursor

  2. Trigger

  3. Select

  4. Procedure


Correct Option: B
Explanation:

A trigger is a statement which is executed automatically as an event after or before modification to the database.

- Hide questions