DBMS-Database Security Questions and Answers
Database Security DBMS questions and answers help students understand how databases are protected from unauthorized access, threats, and data breaches. These programming questions and answers with explanations cover essential DBMS topics like authentication, encryption, authorization, and access control mechanisms. Practicing such questions improves your understanding of SQL privileges, roles, and database protection methods — key areas for campus placements and competitive IT exams. Whether you’re preparing for TCS, Infosys, or Cognizant, solving database security MCQs enhances your preparation for both theoretical and practical interviews.
DBMS-Database Security
Showing 10 of
36 questions
21. Mandatory access control (also called security scheme) is based on the concept of
- access rights
- system-wide policies
- Both (a) and 9b)
- None of these.
22. Loss of confidentiality means that the
- data and system cannot be accessed by the users.
- dinvalid and corrupted data has been generated
- loss of protecting data from individuals.
- loss of protecting data from individual.
23. Loss of privacy means that the
- data and system cannot be accessed by the users
- invalid and corrupted data has been generated
- loss of protecting or maintaining secrecy over critical data of the organisation.
- loss of protecting data from individuals.
24. Which of the following is the process by which a user's identity is checked ?
- Authorization
- Authentication
- Access Control
- None of these
25. Legal and ethical issues are related to the
- rights to access of an individual user, or user groups to accesscertain information.
- enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level.
- Enforcement of the security policy of the organisation with respect to permitting access to various classification of data.
- None of these.
26. Which of the following is the process by which a user's privileges are ascertained ?
- Authorization
- Authentication
- Access Control
- None of these
27. System-related issues are related to the
- rights to access of an individual user or user groups to access certain information.
- enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level.
- enforcement of the security policy of the organisation with respect to permitting access to various classifications of data.
- None of these.
28. Which of the following is the process by which a user's access to physical data in the application is limited, based on his privileges ?
- Authorization
- Authentication
- Access Control
- None of these
29. Organisation level issues are related to the:
- rights to access of an individual user, or user groups to access certain information
- enforcement of various security functions at system levels, for example, at physical hardware level, at the DBMS level or at the operating system level
- enforcement of the security policy of the organisation with respect to permitting access to various classifications of data
- None of these
30. Which of the following is a database privilege ?
- The right to create a tablej or relation.
- The right to select rows form another user's table.
- The right to create a session
- All of these