DBMS-Database Security Questions and Answers

Take Exam

Database Security DBMS questions and answers help students understand how databases are protected from unauthorized access, threats, and data breaches. These programming questions and answers with explanations cover essential DBMS topics like authentication, encryption, authorization, and access control mechanisms. Practicing such questions improves your understanding of SQL privileges, roles, and database protection methods — key areas for campus placements and competitive IT exams. Whether you’re preparing for TCS, Infosys, or Cognizant, solving database security MCQs enhances your preparation for both theoretical and practical interviews.

DBMS-Database Security

Showing 10 of 36 questions

11. encryption alone is sufficient for data security.

  • TRUE
  • FALSE
Show Answer Report

12. Discretionary access control (also called security scheme) is based on the concept of access rights (also called privileges) and mechanism for giving users such privileges.

  • TRUE
  • FALSE
Show Answer Report

13. A firewall is a system designed to prevent unautorized access to or from a private network.

  • TRUE
  • FALSE
Show Answer Report

14. Statistical database security system is used to control the access to a statistical database.

  • TRUE
  • FALSE
Show Answer Report

15. A threat may be caused by a

  • a situation or event involving a perrson that are likely to harm the organisation
  • an action that is likely to hard the organisation
  • circumstances that are likely to harm the organisation
  • All of these
Show Answer Report

16. Loss of availability means that the

  • data cannot be accessed by the users
  • system cannot be accessed by the users.
  • Both data and system cannot be used by the users
  • None of these
Show Answer Report

17. Which of the following is the permission to access a named object in a prescribed manner ?

  • Role
  • Privilege
  • Permission
  • All of these
Show Answer Report

18. Loss of data integrity means that the

  • data and system cannot be accessed by the users
  • invalid and corrupted data has been generated.
  • Loss of protecting of maintaining secrecy over critical data of the organisation
  • loss of protecting data from individuals.
Show Answer Report

19. Which of the following  is not a part of the database security ?

  • Data
  • Hardware and Software
  • People
  • External hackers.
Show Answer Report

20. Discretionary access control (also called security scheme) is based on the concept of

  • access rights
  • system-wide policies
  • Both (a) and (b)
  • None of these
Show Answer Report
Questions and Answers for Competitive Exams Various Entrance Test