Data Base Security PDF
Data Base Security PDF
Data Base Security PDF
1. __________ identifies the database platforms within infrastructure and then examines their
risk exposure.
Ans: Database Risk Assessment (DRA)
4. DAM architecture in which a lightweight sensor is attached to the protected databases and
continuously polls the system global area (SGA) to collect SQL statements. Choose the
appropriate option that closely matches the given statement.
Ans : Memory-based
6. _______ mechanisms ensure that information contained in objects does not flow explicitly or
implicitly into less protected objects.
Ans : Flow Control
7. ________aims to replace sensitive data in transit leaving the original at-rest data intact and
unaltered.
Ans : Dynamic Data Masking
9. ____________ allows for the use of certain operations on database objects as authorized by
another user.
Ans : Object Privileges
10. The process in which the application aggregates all user traffic within a few database
connections that are identified only by a generic service account name is called
_______________.
12. Which of the following option can be considered a target for SQL injection?
Ans: stored procedures and input parameters.
13. ________ is exploited by influencing SQL statements that do not filter input from applications
to a back-end database correctly.
Ans : SQL injection
16. Which of the following options are consequences of user privilege misuse?
Ans : all option
17. _______ provides means to monitor privileged users and application access independent of
native database logging and audit functions.
18. _________ ensures that all direct accesses to the system objects occur base on modes and
rules fixed by protection policies.
19. The DAM architecture in which the systems collect information regarding database activity by
monitoring the communication between the database client and the database server is called
________.
20. ______________ is used to enforce multilevel security by categorizing the data and users
into various security classes.
SQL QUESTION
Create db
1. sqlite3 Employee.db;
USE OF DISTINCT
1. SELECT DISTINCT EMPNAME FROM EMPLOYEE;
UNION
1. SELECT EMPID FROM EMPLOYEE UNION SELECT EMPID FROM PROJECT;
UNION ALL
1. SELECT EMPID FROM EMPLOYEE UNION ALL SELECT EMPID FROM PROJECT;
Example : For example, "LIMIT 4 OFFSET 4" will ignore the first 4 rows, and returned 4 rows
starting from the fifth rows, so you will get rows 5,6,7, and 8.
Q) You can check whether the table is created or not and also the content in the table by
executing below commands.
Ans :
.mode column
SELECT * FROM EMPLOYEE;
Q) Create a CSV file called employee.csv with Basic Ubuntu command (Hint: Sudo nano) and
enter the fields like EMPID, EMPNAME, AGE, ADDRESS, SALARY with the below values
1. nano
2. CTRL+O
3. Write file name employee.csv
4. Press ctrl+M
5. Write the statement that you want to write inside file(employee.csv)
6. CTRL+O
7. Press ctrl+M
8. ctrl+X
Q) The following commands select data from the EMPLOYEE table and export it to the
after_employee.csv file.
.headers on
.mode csv
.output after_employee.csv
select * from EMPLOYEE;
Azure Question
4. Which Azure networking component is the core unit from which administrators can have
full control over IP address assignments, name resolution, security settings, and routing
rules?
Ans : VNET
5. Virtual Machines is an IaaS service that allows you to deploy and manage VMs
inside a VNet.
6. App Service is a managed service to host mobile app backends, web apps,
RESTful APIs, or automated business processes.
7. Service Fabric is known as a distributed systems platform that operates in
numerous environments. Service Fabric is an orchestrator of microservices
across a cluster of machines.
8. Azure Batch is called a managed service for operating large-scale parallel and
high-performance computing (HPC) applications.
9. Cloud Services is a managed service for operating cloud applications and utilizes
a PaaS hosting model.
11. Azure Virtual Machines only support VMs running the Microsoft Windows operating
system.
Ans : False
12. Which of the following Windows Server roles is not supported on Azure Virtual Machines?
Ans : Hyper-V
19: Which type of storage offering uses SSDs and is intended for use with Virtual machines?
Ans : bob(confused)
20. Azure Storage plays the same role in Azure that ______ plays in Amazon Web Services.
Ans : not lnow
22.
Git
Creating Repositry :
2. git init is used for creating an empty repository or for re-initializing an existing repository
3. git status displays the current status of the staging area and the working directory
4. git add prepares the new and existing files for staging . It adds all the new and existing
file/directories to the staging area
5. git commit will take a snapshot and record all the changes into the repository
Angular 2
● When a service is declared at root module and injected in two components, a separate
instance will be created for each of the components.
Ans : True (not confirm)
● Templates can also be added using URLs of the file containing code. True
● Which of the following are valid metadata properties? Ans =All valid
● In-order to bind data from view to component class you can use __________.
Ans : Event Binding
● How many lifecycle methods does Angular offer apart from a Component's construtor()?
Ans : 8
● ______ element property is used to tell angular to insert the instance of component in the
HTML file.
Ans : Template
4. Which selector function is used to select simple selector from compound selector?
Ans : is-superselector() (wrong)
11. Which datatype allows you to represent multiple values using comma or space
seperator?
Ans : List
12. Which datatype allows you to arthimetic operations along with color components?
Ans : Color
13. Which list function is used to return nth element of the list?
Ans : nth()
20. Which command is used to detect the changes that are made to sass file?
Ans : Watch
23. Which datatype allows you to get result using map functions?
Ans : map
26. Which directive allows to loop through each iteration from start to end?
Ans : @for
28. How many types of functions are there in SASS? Ans 4(X)
36. Which directive is used to convert multiple sass files into single or multiple css files?
Ans @extend
Azure Essential Continuum
1. Azure Iaas Services like : Virtual machine, Vnet and Storage
5. Cloud Computing is the use of hardware and software to deliver a service over a
network (typically the Internet).
With cloud computing, users can access files and use applications from any device that
can access the Internet. An example of a Cloud Computing provider is Google's
Gmail.
6.
7. On-premises IT infrastructure is like owning a car. When you buy a car,
you’re responsible for its maintenance, and upgrading means buying a new car.
8. IaaS is like leasing a car. When you lease a car, you choose the car you want
and drive it wherever you wish, but the car isn’t yours. Want an upgrade? Just
lease a different car!
9. PaaS is like taking a taxi. You don’t drive a taxi yourself, but simply tell the
driver where you need to go and relax in the back seat.
10. SaaS is like going by bus. Buses have assigned routes, and you share the
ride with other passengers.
● Virtual Machines.
● Azure RemoteApp.
● Azure Cloud Services.
● Azure Virtual Networks.
● Azure ExpressRoute.
● Traffic Manager.
● Azure Storage.
● Azure Import/Export Service.
● Azure Backup.
● Azure Site Recovery.
Application Services
● SQL Database
● HDInsight®
● Azure Redis Cache
● Azure Machine Learning
● DocumentDB
● Azure Search
16. Azure offers two deployment models and multiple tools for you to be able to deploy
and manage your resources.
17. Virtual Machine : Virtualization is the fundamental technology that powers cloud
computing. This software separates compute environments from physical infrastructures,
so you can run multiple operating systems and applications simultaneously on the same
machine
18. VM Vs Cloud : The Cloud computing works on IaaS (Infrastructure as a Service)
while virtualization is based upon SaaS (Software as a Service). Shared computing
resources like software and Hardware provides you cloud computing environment while
Virtualization comes into existence after Machine/Hardware manipulation.
19. VMware :
20.
Yaml
Ans > ,
Which of the following block nodes are valid?
Block scalar collection
Which of the following symbol is representd by aliasing?
*
Web Content
Which property is used to specify a list of one or more strings separated by
commas indicating a set of possible image sources for the user agent to use.
Ans > SrcSet
● grid-column-start
● grid-row-end
● grid-column-end
In the code flex: 1 0 auto, which property does the second value
represent(here 0)?
Ans > flex-shrink
Which of the following css property is used to define the number of times an
animation should play?
Ans > animation-iteration-count
Which are the different events that the <video> tag generates?
Ans > suspend and ended
ImageData object?
Which HTML5 attribute can be used with HTML5 date input type to limit date
selection?
Which of the following method retrieves the current geographic location of the
user?
Ans > getCurrentPosition()
Which method checks if the browser can play the specified video type?
Ans > canPlayType()
When creating the manifest file and ensuring that the manifest attribute is
correct, which choice shows the correct text for the first line of text?
Ans CACHE MANIFEST
In Cassandra, the ___________ determines how many copies of the data will
be maintained across multiple nodes.
Ans > Raplication Factor
Some of the common Write Consistency level in Cassandra include all except
___________.
Ans > All option
Like most relational databases, Kudu also offers secondary indexes and
uniqueness constraints.
Ans > True
HBase Tables are divided _________ by row key range into ________ .
Ans > h orizontally, regions
In case of an Eventual consistency, reads may not return the most recent
value, but reads will not return values “out of sequence.”
Ans > False(Confrim)
Some of the common Read Consistency level in Cassandra include all except
__________.
Ans > All the option(X)
Document databases split a document into its constituent name/value pairs for
indexing purpose.
Ans > False
The MATCH clause is roughly equivalent to the _______ clause in SQL and
the RETURN clause to a ______ clause.
Ans > Where, select
Cassandra's Gossip Protocol can take care of the heartbeat lost due to
_______ in a widely distributed system.
Ans > Node Failue
The experience users have with your product or service comes through
____________.
Ans Touch
What makes sure that the aesthetic and functional aspects of the button work
in the context of the rest of the product?
Ans > User Experience Design
______ indicators can be traced after the product has been launched to view if
it meets product goals and user requirements.
Ans > Success Matixcs
A schematic representation of all the components of a screen and how they fit
together is called as ____________.
Ans > Wireframe
The discipline associated with creating a structured experience for users is termed as
Interaction Design.
The experience users have with your product or service comes through
____________.
Ans > All the option
The document created for 'listing product objectives' and 'user needs' is called
__________.
Ans > Strategy Documents
To determine the requirements, we put our personas into short stories called
________.
Ans > User Profile(X) I thing User Segment
________ navigation allows the users to access items that they don’t need on
a regular basis.
Ans > Local(X)
Cloud Computing
The resilience characteristic of the cloud helps in easy data recovery after any
failure.
Ans > True(R)
SaaS supports many users and offers a shared data model via ________
model.
Ans > Multi-tendency(R)
Better Control, higher security, and privacy can be achieved through which
type of cloud deployment model?
Ans > Private
Which clouds are on-premise giving IT managers complete control over the
available resources?
Ans > Private
In which cloud model, several organizations access to the same cloud for a
similar application?
Ans > Private
__________ is a tool that communicates with the hosts and their virtual
machines.
Ans > Virtual Machine Monitor(R)
Which of the following cloud client constitute computers without a hard drive?
Ans > None
People from this cultural group are not tolerant of new ideas and opinions that
differ from their own.
Ans > People with low uncertainty avoidance
A process that emphasizes the tasks users must perform and the situation in
which the tasks are performed is ______________________.
Ans> Task Ananlysis
People from this cultural group are more tolerant to new ideas and opinions
that differ from their own.
Ams >