DBMS-Database Security Questions and Answers

Take Exam

Database Security DBMS questions and answers help students understand how databases are protected from unauthorized access, threats, and data breaches. These programming questions and answers with explanations cover essential DBMS topics like authentication, encryption, authorization, and access control mechanisms. Practicing such questions improves your understanding of SQL privileges, roles, and database protection methods — key areas for campus placements and competitive IT exams. Whether you’re preparing for TCS, Infosys, or Cognizant, solving database security MCQs enhances your preparation for both theoretical and practical interviews.

DBMS-Database Security

Showing 10 of 36 questions

21. Mandatory access control (also called security scheme) is based on the concept of

  • access rights
  • system-wide policies
  • Both (a) and 9b)
  • None of these.
Show Answer Report

22. Loss of confidentiality means that the

  • data and system cannot be accessed by the users.
  • dinvalid and corrupted data has been generated
  • loss of protecting data from individuals.
  • loss of protecting data from individual.
Show Answer Report

23. Loss of privacy means that the

  • data and system cannot be accessed by the users
  • invalid and corrupted data has been generated
  • loss of protecting or maintaining secrecy over critical data of the organisation.
  • loss of protecting data from individuals.
Show Answer Report

24. Which of the following is the process by which a user's identity is checked ?

  • Authorization
  • Authentication
  • Access Control
  • None of these
Show Answer Report

25. Legal and ethical issues are related to the

  • rights to access of an individual user, or user groups to accesscertain information.
  • enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level.
  • Enforcement of the security policy of the organisation with respect to permitting access to various classification of data.
  • None of these.
Show Answer Report

26. Which of the following is the process by which a user's privileges are ascertained ?

  • Authorization
  • Authentication
  • Access Control
  • None of these
Show Answer Report

27. System-related issues are related to the

  • rights to access of an individual user or user groups to access certain information.
  • enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level.
  • enforcement of the security policy of the organisation with respect to permitting access to various classifications of data.
  • None of these.
Show Answer Report

28. Which of the following is the process by which a user's access to physical data in the application is limited, based on his privileges ?

  • Authorization
  • Authentication
  • Access Control
  • None of these
Show Answer Report

29. Organisation level issues are related to the:

  • rights to access of an individual user, or user groups to access certain information
  • enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level
  • enforcement of the security policy of the organisation with respect to permitting access to various classifications of data
  • None of these
Show Answer Report

30. Which of the following is a database privilege ?

  • The right to create a tablej or relation.
  • The right to select rows form another user's table.
  • The right to create a session
  • All of these
Show Answer Report
Questions and Answers for Competitive Exams Various Entrance Test