Database Management Systems Mcqs

Page No. 29

Asymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?


aNot true, the message can also be decrypted with the Public Key


bA so called “one way function with back door” is applied for the encryption


cThe Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key


dThe encrypted message contains the function for decryption which identifies the Private Key



Which of the following requires no password travel across the internet?


aReadable system


bManipulation system


cChallenge–response system


dResponse system



Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?


aRound key algorithm


bPublic key algorithm


cAdvanced Encryption Standard


dAsymmetric key algorithm



Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________


aDictionary attacks


bDatabase attacks


cMinor attacks


dRandom attacks


View Answer Dictionary attacks

In which of the following encryption key is used to encrypt and decrypt the data?


aPublic key


bPrivate key


cSymmetric key


dAsymmetric key


View Answer Symmetric key

Which of the following is not a property of good encryption technique?


aRelatively simple for authorized users to encrypt and decrypt data


bDecryption key is extremely difficult for an intruder to determine


cEncryption depends on a parameter of the algorithm called the encryption key


dNone of the mentioned


View Answer None of the mentioned

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without


aEncryption key


bDecryption key


cPrimary key


dAuthorised key


View Answer Decryption key

___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.


aEncryption


bData mining


cInternet Security


dArchitectural security


View Answer Encryption

VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism.


aRow-level authorization


bColumn-level authentication


cRow-type authentication


dAuthorization security



_______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.


aOpenID


bSingle-site system


cSecurity Assertion Markup Language (SAML)


dVirtual Private Database (VPD)



Goto Page No.

Page 29 of 101

Alphabetical MCQs Categories

Here below You find all kind of categories of MCQs in alphabetical order.


"Comprehensive Collection of MCQs: Alphabetically Organized by Subject"

"Discover an extensive collection of multiple-choice questions (MCQs) neatly categorized by subject from A to Z. This resource is designed for anyone eager to explore various topics in a straightforward and organized manner. Whether you're a student preparing for exams, an educator seeking supplementary materials, or simply curious about different subjects, this compilation offers a convenient way to learn and assess your knowledge. With questions arranged alphabetically, navigation is effortless, allowing you to delve into subjects of interest at your own pace. Engage, learn, and expand your understanding with this accessible and comprehensive repository of MCQs!"


BolPakistan

bolpakistan.com.pk includes Job Mcqs and Pak Mcqs is the Top Largest Mcqs Forum in World, in which you can read Mcqs of All Subjects, PPSC test preparation, FPSC, NTS and PPSC PAST PAPERS, PPSC PAST MCQS. A Collection of Repeated MCQs for JOBs seekers.

Copyright © 2024, Designed & Developed by BolPakistan