May 2021 - Pci3l
May 2021 - Pci3l
May 2021 - Pci3l
2. RDBMS.
5. What is an object?
6. What is encryption?
7. Authentication.
8. Audit trails.
9. Define VPD.
17. What are the need for virtual private database (VPDs)?
PART C — (3 × 10 = 30 marks)
Answer any THREE questions, in 500 words each.
———————
1) A surrogate key on a table is a column with a unique
identifier for each row. The key is not generated from
the table data. Data modelers like to create surrogate
keys on their tables when they design data warehouse
models.
2) A relational database is a type of database that stores and
provides access to data points that are related to one
another. Relational databases are based on the relational
model, an intuitive, straightforward way of representing
data in tables.
3) A data risk assessment is the process by which an
organization reviews sensitive data under its control.
4) Data risk management is the controlled process an
organization uses when acquiring, storing, transforming,
and using its data, from creation to retirement, to
eliminate data risk
5) An object database or object-oriented database is a
database management system in which information is
represented in the form of objects as used in object-
oriented programming. Object databases are different
from relational databases which are table-oriented.
6) In cryptography, encryption is the process of encoding
information. This process converts the original
representation of the information, known as plaintext,
into an alternative form known as ciphertext. Ideally,
only authorized parties can decipher a ciphertext back to
plaintext and access the original information.
7) The process or action of verifying the identity of a user
or process“user authentication for each device ensures
that the individual using the device is recognized by the
company”
8) An audit trail is a security-relevant chronological record,
set of records, and/or destination and source of records
that provide documentary evidence of the sequence of
activities that have affected at any time a specific
operation, procedure, event, or device
9) A virtual private database or VPD masks data in a larger
database so that only a subset of the data appears to
exist, without actually segregating data into different
tables, schemas or databases
10) SQL injection is a code injection technique that might
destroy your database. SQL injection is one of the most
common web hacking techniques
12)A password is a form of secret authentication data that is
used to control access to a resource. The password is kept
secret from those not allowed access, and those wishing to
gain access are tested on whether or not they know the
password and are granted or denied access accordingly.
13)A database management system (DBMS) is system
software for creating and managing databases. A DBMS
makes it possible for end users to create, protect, read,
update and delete data in a database. The most prevalent
type of data management platform, the DBMS essentially
serves as an interface between databases and users or
application programs, ensuring that data is consistently
organized and remains easily accessible.
What does a DBMS do?
Store*
Analyze
Use
Publish
Archive
Purge