On This Page

This set of DataBase Management System (DBMS) Multiple Choice Questions & Answers (MCQs) focuses on Database Management System Set 18

Q1 | Each array declaration need not give, implicitly or explicitly, the information about
  • the name of array
  • the data type of array
  • the first data from the set to be stored
  • the index set of the array
Q2 | In                                    attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
  • sql injection
  • sql
  • direct
  • application
Q3 | A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a                                        attack.
  • two-factor authentication
  • cross-site request forgery
  • cross-site scripting
  • cross-site scoring scripting
Q4 |                    is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
  • two-factor authentication
  • cross-site request forgery
  • cross-site scripting
  • cross-site scoring scripting
Q5 | A single                              further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.
  • openid
  • sign-on system
  • security assertion markup language (saml)
  • virtual private database (vpd)
Q6 | The                                        is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on.
  • openid
  • sign-on system
  • security assertion markup language (saml)
  • virtual private database (vpd)
Q7 |                                allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.
  • openid
  • single-site system
  • security assertion markup language (saml)
  • virtual private database (vpd)
Q8 | VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a                             mechanism.
  • row-level authorization
  • column-level authentication
  • row-type authentication
  • authorization security
Q9 |                        is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.
  • encryption
  • data mining
  • internet security
  • architectural security
Q10 | In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
  • encryption key
  • decryption key
  • primary key
  • authorised key
Q11 | Which of the following is not a property of good encryption technique?
  • relatively simple for authorized users to encrypt and decrypt data
  • decryption key is extremely difficult for an intruder to determine
  • encryption depends on a parameter of the algorithm called the encryption key
  • none of the mentioned
Q12 | In which of the following encryption key is used to encrypt and decrypt the data?
  • public key
  • private key
  • symmetric key
  • asymmetric key
Q13 | Encryption of small values, such as identifiers or names, is made complicated by the possibility of                      
  • dictionary attacks
  • database attacks
  • minor attacks
  • random attacks
Q14 | Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?
  • round key algorithm
  • public key algorithm
  • advanced encryption standard
  • asymmetric key algorithm
Q15 | Which of the following requires no password travel across the internet?
  • readable system
  • manipulation system
  • challenge–response system
  • response system
Q16 | The                    is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware.
  • cache
  • disk
  • main memory
  • flash memory
Q17 | Which of the following stores several gigabytes of data but usually lost when power failure?
  • flash memory
  • disk
  • main memory
  • secondary memory
Q18 | The flash memory storage used are
  • nor flash
  • or flash
  • and flash
  • all of the mentioned
Q19 |                      is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory.
  • flash memory
  • disk
  • main memory
  • secondary memory
Q20 | The primary medium for the long-term online storage of data is the                       where the entire database is stored on magnetic disk.
  • semiconductor memory
  • magnetic disks
  • compact disks
  • magnetic tapes
Q21 | Optical disk                systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand.
  • tape storage
  • jukebox
  • flash memory
  • all of the mentioned
Q22 | There are “record-once” versions of the compact disk and digital video disk, which can be written only once; such disks are also called                      disks.
  • write-once, read-many (worm)
  • cd-r
  • dvd-w
  • cd-rom
Q23 | In magnetic disk                  stores information on a sector magnetically as reversals of the direction of magnetization of the magnetic material.
  • read–write head
  • read-assemble head
  • head–disk assemblies
  • disk arm
Q24 | A                      is the smallest unit of information that can be read from or written to the disk.
  • track
  • spindle
  • sector
  • platter
Q25 | The disk controller uses                  at each sector to ensure that the data is not corrupted on data retrieval.
  • checksum
  • unit drive
  • read disk
  • readsum