Data Base Flashcards

1
Q

What is a PA file sight ?

A
  • a ransomware protection and access auditing software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Traditional database security operates on three levels :

A
  • Database level
  • Access Level
  • Perimeter Level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a database level?

A
  • Data security has revolve four main practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Access level?

A
  • Organizing users of a database according to different authorizing models and allowing for different privileges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is perimeter level?

A
  • Involves three main methods of building a wall around a data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does key management means ?

A

It’s one of the database encryption disadvantages and it means that authorized users must have access to decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does inflexibility means ?

A

Its one of the database encryption disadvantages and it means that when a part or all the database encrypted it becomes difficult to search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data masking definition:

A
  • It’s replacing real data with fake-but-useable data for development , testing and training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Masking Includes :

A

Encryption , scrambling, Substitution and nulling out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why Data Masking ?

A

Used for protecting data from insiders threats and mainly used in database backups and data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Database tokenization

A
  • It is a technique that comes from credit card industry
  • Replaces personally identifiable data with surrogate value
  • The key of reversing that process is in separate Database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical database security

A

A range of best practices to protect physical services where data is held
- With industry shift to cloud-based data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In perimeter level what are the things that build a wall around a data?

A
  • Firewalls and Web application firewalls , VPNs , User authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewalls vs. Web application firewalls

A
  • Firewalls : protect a secure local network
  • Web application firewalls : protects web web applications by acting like a barrier between external and internal network traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud Database Security

A
  • Cloud database dissolve perimeter and with no perimeter means data lose prevention (DLP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Structured Query Language (SQL)

A
  • Is a standardized language that can be used to define schema, manipulate and query data is a relational database
17
Q

Why is a SQLi Attack is designed for ?

A
  • For sending malicious SQL commands to the database server