DBMS-Database Security Questions and Answers
Database Security DBMS questions and answers help students understand how databases are protected from unauthorized access, threats, and data breaches. These programming questions and answers with explanations cover essential DBMS topics like authentication, encryption, authorization, and access control mechanisms. Practicing such questions improves your understanding of SQL privileges, roles, and database protection methods — key areas for campus placements and competitive IT exams. Whether you’re preparing for TCS, Infosys, or Cognizant, solving database security MCQs enhances your preparation for both theoretical and practical interviews.
DBMS-Database Security
Showing 10 of
36 questions
1. Database security encompasses hardware, sotware, network, people and data of the organisation.
- TRUE
- FALSE
2. Threats are any situation or event, whether intentional or accidental, that may adversely affect a system and consequently the organisation .
- TRUE
- FALSE
3. Authentication is a mechanism that determines whether a user is who he or she claims to be.
- TRUE
- FALSE
4. When a user is authenticated, he or she is verified as an authorized user of an application.
- TRUE
- FALSE
5. When a user is authenticated, he or she is verified as an authorized user of an application.
- TRUE
- FALSE
6. Authorization and authentication controls can be built into the software.
- TRUE
- FALSE
8. A user automatically has all object privileges for the objects that are owned by him/her.
- TRUE
- FALSE
9. The REVOKE command is used to take away a privilege that was granted.
- TRUE
- FALSE
10. encryption access conrol (also called security scheme) is based on the concept of access rights (also called privileges) and mechanism for giving users such privileges.
- TRUE
- FALSE