- Arts & Culture 5972
- Business & Economics 690
- Computers 317
- Dictionaries & Encyclopedias 82
- Education & Science 76576
- Abstracts 226
- Astrology 4
- Astronomy 1
- Biology 8
- Chemistry 2654
- Coursework 15846
- Culture 8
- Diplomas 411
- Drawings 576
- Ecology 6
- Economy 82
- English 78
- Ethics, Aesthetics 3
- For Education Students 17639
- Foreign Languages 11
- Geography 3
- Geology 1
- History 89
- Maps & Atlases 5
- Mathematics 13871
- Musical Literature 2
- Pedagogics 19
- Philosophy 23
- Physics 15074
- Political Science 5
- Practical Work 101
- Psychology 60
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sexology 42
- Sociology 9
- Summaries, Cribs 87
- Test Answers 154
- Tests 8965
- Textbooks for Colleges and Universities 32
- Theses 24
- To Help Graduate Students 14
- To Help the Entrant 37
- Vetting 364
- Works 13
- Информатика 10
- Engineering 3062
- Fiction 695
- House, Family & Entertainment 106
- Law 133
- Website Promotion 71
Operating System and Database Security - Answers
Uploaded: 01.04.2024
Content: Ответы - Безопасность операционных систем и баз данных - СИНРЕГИЯ.docx 19,94 kB
Seller will give you a gift certificate in the amount of
Product description
Ready answers to the test Security of operating systems and databases.
Educational institution: SYNERGY, MY, MIT.
Delivery: fresh.
The result of passing is 95-100 points.
Below you can find questions on the Security of Operating Systems and Databases test.
QUESTIONS FOR THE TEST:
Loss of data integrity leads to...
The role of the real (working with objects) subject is played by...
The periodic procedure for obtaining a copy of the database is...
Corporate integrity constraints...
For a Linux system, the minimum password length must be ... characters
To enable users to perform tasks that fall within the scope of their job responsibilities, they are provided with...
Loss of data confidentiality leads to...
DirectAccess technology is used for...
The ticket that Kerberos issues has a typical expiration date...
The concept of “identification” assumes that...
For recovery log files, Oracle recommends using a RAID level...
The highest level of information protection is achieved when implementing...
Database protection covers...
A potential threat in the loading HTML page could be...
The Oracle Advanced Security (OAS) feature of the Oracle database management system (DBMS) is...
The concept of "implied trust" suggests that...
Disabling the access channel leads to...
The concept of “threshold value” assumes that...
When implementing the concept of building a security system based on a centralized administration scheme, the user...
Applying protection mechanisms to specific applications, such as FTP and Telnet servers, provides a firewall method called "..."
Maintaining two identical (mirror) copies of data on different disks is typical for the RAID array level...
The dynamic result of one or more relational operations on a basic relationship to create some other relationship is...
Interception of all messages entering and leaving the network provides a method for organizing the operation of the firewall "..."
On a Linux system, the time after which a user is automatically logged off from the system if he is inactive is determined by the variable...
AppLocker technology is used for...
Kerberos is designed for...
The Oracle Label Security (OLS) tool of the Oracle database management system (DBMS) is...
The Virtual Private Database (VPD) tool of the Oracle database management system (DBMS) is...
UNIX OS uses the "..." access model.
There is no data duplication and therefore the highest write performance for the RAID level...
For database files, Oracle recommends using a RAID level...
The concept of “disconnection” suggests that...
BitLocker technology is used for...
The Access database management system (DBMS) provides the following two groups by default: ...
The procedure for creating and maintaining a file containing information about all changes made to the database is...
The basis for data exchange on the Internet are protocols...
Analyzing each packet entering or leaving the network provides a method for organizing the operation of the firewall "..."
A secure channel protocol that provides support for strong client authentication is...
The rule when assigning privileges is that the user must receive...
Integrity of entities...
The Fine Grained Audit Control (FGAC) tool of the Oracle database management system (DBMS) is...
On Linux, to change the default password length, you need to edit the file...
The ownership of objects by the database management system (DBMS) itself in the DBMS environment is usually formalized using a special identifier “...”
In UNIX OS, the role of the nominal security principal is played by...
In UNIX OS, the role of the nominal security principal is played by...
The use of security mechanisms during the establishment of a TCP or UDP connection provides a method for organizing the work of a firewall
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |